[ T394] device hsr_slave_1 left promiscuous mode 17:10:56 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 313.368686][ T394] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 313.381881][ T394] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 313.413577][ T394] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 313.430854][ T394] batman_adv: batadv0: Removing interface: batadv_slave_1 17:10:56 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 313.458968][ T394] device bridge_slave_1 left promiscuous mode [ 313.477713][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.572288][ T394] device bridge_slave_0 left promiscuous mode [ 313.581582][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.659331][ T394] device hsr_slave_0 left promiscuous mode [ 313.698879][ T394] device hsr_slave_1 left promiscuous mode [ 313.707451][ T394] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 313.734746][ T394] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 313.746419][ T394] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 313.753851][ T394] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 313.786655][ T394] device bridge_slave_1 left promiscuous mode [ 313.792867][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.825487][ T394] device bridge_slave_0 left promiscuous mode [ 313.831746][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.883264][ T394] device hsr_slave_0 left promiscuous mode [ 313.913557][ T394] device hsr_slave_1 left promiscuous mode [ 313.947376][ T394] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 313.957360][ T394] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 313.977391][ T394] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 313.996585][ T394] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 314.015833][ T394] device bridge_slave_1 left promiscuous mode [ 314.022023][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.052361][ T394] device bridge_slave_0 left promiscuous mode [ 314.069527][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.097275][ T394] device hsr_slave_0 left promiscuous mode [ 314.110371][ T394] device hsr_slave_1 left promiscuous mode [ 314.122822][ T394] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 314.140612][ T394] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 314.163964][ T394] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 314.177803][ T394] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 314.192244][ T394] device bridge_slave_1 left promiscuous mode [ 314.204455][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.217962][ T394] device bridge_slave_0 left promiscuous mode [ 314.224239][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.286854][ T394] device veth1_macvtap left promiscuous mode [ 314.309025][ T394] device veth0_macvtap left promiscuous mode [ 314.318595][ T394] device veth1_vlan left promiscuous mode [ 314.328728][ T394] device veth0_vlan left promiscuous mode [ 314.359525][ T394] device veth1_macvtap left promiscuous mode [ 314.374753][ T394] device veth0_macvtap left promiscuous mode [ 314.380817][ T394] device veth1_vlan left promiscuous mode [ 314.414667][ T394] device veth0_vlan left promiscuous mode [ 314.425589][ T394] device veth1_macvtap left promiscuous mode [ 314.431636][ T394] device veth0_macvtap left promiscuous mode [ 314.444428][ T394] device veth1_vlan left promiscuous mode [ 314.464637][ T394] device veth0_vlan left promiscuous mode [ 314.483012][ T394] device veth1_macvtap left promiscuous mode [ 314.497153][ T394] device veth0_macvtap left promiscuous mode [ 314.503225][ T394] device veth1_vlan left promiscuous mode [ 314.524632][ T394] device veth0_vlan left promiscuous mode [ 315.639314][ T394] team0 (unregistering): Port device team_slave_1 removed [ 315.671641][ T394] team0 (unregistering): Port device team_slave_0 removed [ 315.701181][ T394] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 315.736316][ T394] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 315.881185][ T394] bond0 (unregistering): Released all slaves [ 316.115791][ T394] team0 (unregistering): Port device team_slave_1 removed [ 316.147265][ T394] team0 (unregistering): Port device team_slave_0 removed [ 316.176531][ T394] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 316.211151][ T394] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 316.421454][ T394] bond0 (unregistering): Released all slaves [ 316.741713][ T394] team0 (unregistering): Port device team_slave_1 removed [ 316.757035][ T394] team0 (unregistering): Port device team_slave_0 removed [ 316.800090][ T394] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 316.826917][ T394] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 316.945966][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.952439][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 317.006179][ T394] bond0 (unregistering): Released all slaves [ 317.187712][ T394] team0 (unregistering): Port device team_slave_1 removed [ 317.201322][ T394] team0 (unregistering): Port device team_slave_0 removed [ 317.219793][ T394] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 317.235302][ T394] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 317.308750][ T394] bond0 (unregistering): Released all slaves 17:11:00 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) [ 317.390017][T15546] device veth0_macvtap entered promiscuous mode [ 317.415290][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 317.452275][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 317.478208][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 317.488085][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 317.522776][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.552682][T15578] 8021q: adding VLAN 0 to HW filter on device batadv0 17:11:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) [ 317.569178][T15546] device veth1_macvtap entered promiscuous mode [ 317.625396][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 317.633665][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.656085][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 317.664104][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 317.689780][T15534] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.703190][T15546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 317.721751][T15546] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.742919][T15546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 317.770450][T15546] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.796331][T15546] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 317.822483][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.836443][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 17:11:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) [ 317.868333][T15546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 317.909816][T15546] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.944738][T15546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 317.955608][T15546] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.977141][T15546] batman_adv: batadv0: Interface activated: batadv_slave_1 17:11:00 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, 0x0) [ 318.018231][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 318.035035][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 318.050977][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 318.084150][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 318.102958][T15546] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.116583][T15546] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.125887][T15546] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 17:11:00 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d18") 17:11:00 executing program 0: ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) [ 318.137554][T15546] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.190635][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 318.216320][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 318.235210][T15578] device veth0_vlan entered promiscuous mode 17:11:00 executing program 0: ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) [ 318.262239][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 318.272531][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 17:11:01 executing program 0: ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) [ 318.395853][T15578] device veth1_vlan entered promiscuous mode [ 318.418253][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 318.428408][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 17:11:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) [ 318.445102][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 318.464852][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 318.482596][T15534] device veth0_vlan entered promiscuous mode 17:11:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) [ 318.520183][T15534] device veth1_vlan entered promiscuous mode [ 318.547195][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 318.562607][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 17:11:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) [ 318.585754][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 318.609159][T15578] device veth0_macvtap entered promiscuous mode [ 318.641405][T15578] device veth1_macvtap entered promiscuous mode [ 318.646815][T15397] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 318.671566][T15397] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 318.702450][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 318.710491][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 318.722694][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 318.734458][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 318.747629][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 318.759668][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 318.772392][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 17:11:01 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) [ 318.816210][T15534] device veth0_macvtap entered promiscuous mode [ 318.845075][T15534] device veth1_macvtap entered promiscuous mode 17:11:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) [ 318.890208][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 318.905425][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 318.913976][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 318.931884][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 318.959106][T15578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 318.979174][T15578] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.996980][T15578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.016721][T15578] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.034314][T15578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.054311][T15578] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:11:01 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) [ 319.073424][T15578] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 319.092890][T15578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.111095][T15578] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.128654][T15578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.148402][T15578] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.170575][T15578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.188525][T15578] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.207825][T15578] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 319.221155][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 319.225209][T15397] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 319.230207][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 319.257059][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 319.259774][T15397] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 319.270639][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 319.288140][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 319.305076][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:11:02 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) [ 319.334606][T15534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.359919][T15534] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.374331][T15534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.394338][T15534] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.404161][T15534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.425492][T15534] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.444474][T15534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.455248][T15534] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.476353][T15534] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 319.490853][T15578] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.501650][T15578] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.514733][T15578] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.523450][T15578] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 17:11:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0x0) 17:11:02 executing program 2: ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:02 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 319.563308][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 319.575332][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 319.588947][T15534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.634341][T15534] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.644183][T15534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 17:11:02 executing program 2: ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) [ 319.704837][T15534] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.749517][T15534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.776433][T15534] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.789356][T15534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.817152][T15534] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.847980][T15534] batman_adv: batadv0: Interface activated: batadv_slave_1 17:11:02 executing program 2: ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) [ 319.874594][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 319.886013][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:11:02 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32") 17:11:02 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 319.941789][T15534] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.959207][T15534] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.974330][T15534] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.983226][T15534] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 17:11:02 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:02 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:02 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) [ 320.345947][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 320.353988][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 320.365274][T15397] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 320.373303][T15397] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 320.416050][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 320.424034][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 320.440069][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 320.466602][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 320.503270][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 17:11:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='/dev/net/tun\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0xdf, 0x60, 0x5, 0xff, 0x0, 0x8000, 0x4004d, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000140), 0x18}, 0x402, 0xfff, 0x6c665794, 0x1, 0x9, 0x38000000, 0x2, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000240)={'veth0_to_hsr', 0x32, 0x39}, 0xf) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, r1, 0x4, r2, 0x9) 17:11:03 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:03 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 320.585994][T15397] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 320.594006][T15397] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:11:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='/dev/net/tun\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0xdf, 0x60, 0x5, 0xff, 0x0, 0x8000, 0x4004d, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000140), 0x18}, 0x402, 0xfff, 0x6c665794, 0x1, 0x9, 0x38000000, 0x2, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000240)={'veth0_to_hsr', 0x32, 0x39}, 0xf) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, r1, 0x4, r2, 0x9) 17:11:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:03 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) [ 320.653804][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:11:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='/dev/net/tun\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0xdf, 0x60, 0x5, 0xff, 0x0, 0x8000, 0x4004d, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000140), 0x18}, 0x402, 0xfff, 0x6c665794, 0x1, 0x9, 0x38000000, 0x2, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, r1, 0x4, r2, 0x9) 17:11:03 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) 17:11:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='/dev/net/tun\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0xdf, 0x60, 0x5, 0xff, 0x0, 0x8000, 0x4004d, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000140), 0x18}, 0x402, 0xfff, 0x6c665794, 0x1, 0x9, 0x38000000, 0x2, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, r1, 0x4, r2, 0x9) 17:11:03 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='/dev/net/tun\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, r1, 0x4, 0xffffffffffffffff, 0x9) 17:11:03 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) 17:11:03 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='/dev/net/tun\x00') perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:03 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:03 executing program 4: syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) 17:11:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:04 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 4: syz_clone(0x0, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) 17:11:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) 17:11:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:04 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:05 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:05 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:05 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0) 17:11:05 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x6) 17:11:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0x0) 17:11:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0x0) 17:11:05 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:05 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:11:05 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0x0) 17:11:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)) 17:11:06 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)) 17:11:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)) 17:11:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='/dev/net/tun\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0xdf, 0x60, 0x5, 0xff, 0x0, 0x8000, 0x4004d, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000140), 0x18}, 0x402, 0xfff, 0x6c665794, 0x1, 0x9, 0x38000000, 0x2, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x82, 0x73, 0x80, 0x0, 0x0, 0x7fffffff, 0xb204, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, r1, 0x4, r2, 0x9) 17:11:07 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:07 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:07 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:07 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:07 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:07 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:07 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5000, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:07 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:07 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:07 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:08 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:08 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:08 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:08 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:08 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:08 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:08 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:08 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:08 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:08 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:09 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:09 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x40000, 0x0, 0x0, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:09 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x40000, 0x0, 0x0, 0x0, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:09 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:09 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:09 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:09 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:09 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x40000}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:09 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) 17:11:09 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:11:09 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:09 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:09 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:09 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:10 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:10 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:10 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:10 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:10 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:10 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:10 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:11 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:11 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:11 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:11 executing program 0: socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:11 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:11 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:11 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:12 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:12 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:12 executing program 0: socketpair(0x0, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:12 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:12 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:12 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:12 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:12 executing program 0: socketpair(0x0, 0x0, 0xfffffe01, &(0x7f0000000a80)) 17:11:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:13 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:13 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:13 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a80)) 17:11:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:13 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:13 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) 17:11:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:14 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) 17:11:14 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:14 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b3") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:14 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) 17:11:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:14 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) 17:11:14 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) 17:11:15 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:15 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:15 executing program 3: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 17:11:15 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b3") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:15 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) 17:11:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:16 executing program 3: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 17:11:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:16 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) 17:11:16 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:17 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b3") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:17 executing program 3: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 17:11:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:17 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:17 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:17 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={0x0, 0x0, 0x18}, 0x18) 17:11:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:18 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d18") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:18 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:18 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={0x0}, 0x18) 17:11:18 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:19 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={0x0}, 0x18) 17:11:19 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:19 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d18") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:19 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={0x0}, 0x18) 17:11:19 executing program 2: socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:19 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:20 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) 17:11:20 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:20 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:11:20 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:21 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:21 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d18") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:21 executing program 2: socketpair(0x0, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:21 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:21 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:21 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b3") 17:11:22 executing program 2: socketpair(0x0, 0x0, 0xfffffe01, &(0x7f0000000a80)) 17:11:22 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:22 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32") 17:11:22 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:22 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a80)) 17:11:22 executing program 4: socketpair(0x0, 0x0, 0xfffffe01, &(0x7f0000000a80)) 17:11:22 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:23 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d18") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:23 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) 17:11:23 executing program 4: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32") 17:11:23 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:23 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:24 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") 17:11:24 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") 17:11:24 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) 17:11:24 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:25 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)) 17:11:25 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:25 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:25 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) 17:11:25 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:26 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:26 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:26 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:26 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:26 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:27 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:28 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a", 0x24, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:28 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)) 17:11:28 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) 17:11:28 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:28 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) 17:11:28 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)) 17:11:29 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:29 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df76", 0x22, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:29 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:11:29 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:29 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:29 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:30 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:30 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:30 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:30 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:30 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:31 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:31 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:31 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:31 executing program 4: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:31 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:32 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:32 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:32 executing program 2: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:32 executing program 4: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:33 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8", 0x13, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x3, 0xf8, 0x2, 0x9, 0x0, 0x74f, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 17:11:33 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:33 executing program 2: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000100)=r1) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) 17:11:34 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x3, 0xf8, 0x2, 0x9, 0x0, 0x74f, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 17:11:34 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:34 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x3, 0xf8, 0x2, 0x9, 0x0, 0x74f, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 17:11:35 executing program 2: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:35 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x3, 0xf8, 0x2, 0x9, 0x0, 0x74f, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:11:35 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:35 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:36 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x3, 0xf8, 0x2, 0x9, 0x0, 0x74f, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:11:36 executing program 2: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:11:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:11:36 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:36 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:36 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") [ 355.396634][ T144] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 17:11:39 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xfffffffa, 0x0}, 0x8) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r0, 0xffff, 0x8}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r1}, 0x18) 17:11:40 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xfffffffa, 0x0}, 0x8) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r0, 0xffff, 0x8}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r1}, 0x18) 17:11:40 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xfffffffa, 0x0}, 0x8) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r0, 0xffff, 0x8}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r1}, 0x18) [ 358.261879][ T144] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 17:11:41 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:41 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xfffffffa}, 0x8) 17:11:41 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) [ 359.946128][ T144] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 17:11:42 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) 17:11:43 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) 17:11:43 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x8) [ 360.882698][ T144] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 17:11:43 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:44 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x8) 17:11:45 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:45 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x8) 17:11:45 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:47 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:48 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:49 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:50 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") 17:11:51 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:52 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") 17:11:53 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") 17:11:53 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:55 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) 17:11:56 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={0x0, 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:11:56 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) 17:11:58 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) 17:11:58 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={0x0, 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 378.375877][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.382192][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 17:12:01 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:12:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:12:02 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={0x0, 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:12:02 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:12:02 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:12:03 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00'}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 383.094339][ T13] Bluetooth: hci0: command 0x0409 tx timeout [ 383.193361][T15795] Bluetooth: hci1: command 0x0409 tx timeout [ 383.254322][ T3562] Bluetooth: hci2: command 0x0409 tx timeout 17:12:06 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:12:06 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00'}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 384.301831][T17249] chnl_net:caif_netlink_parms(): no params data found [ 384.339760][T17250] chnl_net:caif_netlink_parms(): no params data found [ 385.174336][ T3558] Bluetooth: hci0: command 0x041b tx timeout [ 385.254492][ T3558] Bluetooth: hci1: command 0x041b tx timeout [ 385.334339][ T3562] Bluetooth: hci2: command 0x041b tx timeout 17:12:09 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00'}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 387.200443][T17255] chnl_net:caif_netlink_parms(): no params data found [ 387.254399][ T3562] Bluetooth: hci0: command 0x040f tx timeout 17:12:10 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 387.334590][ T3562] Bluetooth: hci1: command 0x040f tx timeout [ 387.414351][ T3562] Bluetooth: hci2: command 0x040f tx timeout [ 389.334331][ T3558] Bluetooth: hci0: command 0x0419 tx timeout [ 389.414322][ T3562] Bluetooth: hci1: command 0x0419 tx timeout [ 389.494323][ T3562] Bluetooth: hci2: command 0x0419 tx timeout 17:12:14 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:12:14 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:12:21 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 398.743529][T17249] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.755394][T17249] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.763435][T17249] device bridge_slave_0 entered promiscuous mode [ 398.833296][T17250] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.844854][T17250] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.852901][T17250] device bridge_slave_0 entered promiscuous mode 17:12:21 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 398.900288][T17255] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.923366][T17255] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.955763][T17255] device bridge_slave_0 entered promiscuous mode [ 398.979960][T17249] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.987743][T17249] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.013172][T17249] device bridge_slave_1 entered promiscuous mode [ 399.045504][T17250] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.052575][T17250] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.106031][T17250] device bridge_slave_1 entered promiscuous mode [ 399.114426][T17255] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.121481][T17255] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.165374][T17255] device bridge_slave_1 entered promiscuous mode [ 400.934344][ T3560] Bluetooth: hci6: command 0x0406 tx timeout 17:12:24 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:12:24 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 403.229066][T17249] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 403.250339][T17250] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 403.269931][T17255] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 403.301567][T17255] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 17:12:26 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:12:26 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 403.362516][T17249] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 403.386012][T17250] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 17:12:28 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:12:28 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 405.384034][T17255] team0: Port device team_slave_0 added [ 405.761151][T17249] team0: Port device team_slave_0 added [ 405.768779][T17249] team0: Port device team_slave_1 added [ 405.799292][T17250] team0: Port device team_slave_0 added [ 405.812824][T17255] team0: Port device team_slave_1 added [ 406.054347][ T3562] Bluetooth: hci8: command 0x0406 tx timeout [ 408.422036][T17250] team0: Port device team_slave_1 added [ 408.736140][T17255] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 408.743106][T17255] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 408.812214][T17255] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 17:12:31 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:12:31 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 409.284295][T17249] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 409.292806][T17249] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 409.374315][T17249] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 409.794186][T17255] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 409.812855][T17255] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 409.879432][T17255] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 411.047036][T17249] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 411.060046][T17249] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 411.135041][T17249] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 411.170480][T17250] batman_adv: batadv0: Adding interface: batadv_slave_0 17:12:33 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 411.178623][T17250] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 411.234318][T17250] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 17:12:34 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 412.749665][ T144] device hsr_slave_0 left promiscuous mode 17:12:35 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 412.980894][ T144] device hsr_slave_1 left promiscuous mode [ 413.236726][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 413.244205][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 17:12:36 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 413.316428][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 413.323870][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 413.556420][ T144] device bridge_slave_1 left promiscuous mode [ 413.562734][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.760413][ T144] device bridge_slave_0 left promiscuous mode [ 413.794423][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 17:12:36 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 415.524498][ T144] device veth1_macvtap left promiscuous mode [ 415.530572][ T144] device veth0_macvtap left promiscuous mode [ 415.548819][ T144] device veth1_vlan left promiscuous mode [ 415.564660][ T144] device veth0_vlan left promiscuous mode [ 430.005440][ T144] team0 (unregistering): Port device team_slave_1 removed [ 430.502881][ T144] team0 (unregistering): Port device team_slave_0 removed [ 430.810259][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 431.456089][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 434.069213][ T144] bond0 (unregistering): Released all slaves [ 434.983728][T17250] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 434.992634][T17250] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 435.035436][T17250] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 17:12:58 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 435.838275][T17255] device hsr_slave_0 entered promiscuous mode [ 436.054748][T17255] device hsr_slave_1 entered promiscuous mode 17:12:59 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 437.023811][T17250] device hsr_slave_0 entered promiscuous mode [ 437.253442][T17250] device hsr_slave_1 entered promiscuous mode [ 437.428189][T17250] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 437.455776][T17250] Cannot create hsr debugfs directory 17:13:00 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 438.051145][T17249] device hsr_slave_0 entered promiscuous mode [ 438.124762][T17249] device hsr_slave_1 entered promiscuous mode [ 438.234576][T17249] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 438.242189][T17249] Cannot create hsr debugfs directory 17:13:01 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:01 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:02 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:02 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 439.827773][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.834414][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 17:13:02 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:03 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:03 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:04 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:05 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:05 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:05 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:06 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:06 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:06 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:10 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:10 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 447.701481][T17597] chnl_net:caif_netlink_parms(): no params data found [ 448.150626][T17600] chnl_net:caif_netlink_parms(): no params data found [ 448.249233][T17595] chnl_net:caif_netlink_parms(): no params data found [ 448.934374][ T3562] Bluetooth: hci0: command 0x0409 tx timeout [ 449.014513][ T3562] Bluetooth: hci1: command 0x0409 tx timeout [ 449.094461][T15788] Bluetooth: hci2: command 0x0409 tx timeout 17:13:12 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 449.592717][T17597] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.604300][T17597] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.612331][T17597] device bridge_slave_0 entered promiscuous mode 17:13:12 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 450.737926][T17597] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.751769][T17597] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.801840][T17597] device bridge_slave_1 entered promiscuous mode [ 451.014382][T15788] Bluetooth: hci0: command 0x041b tx timeout [ 451.104465][T15788] Bluetooth: hci1: command 0x041b tx timeout [ 451.194314][T15788] Bluetooth: hci2: command 0x041b tx timeout 17:13:14 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:14 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 452.274357][T17600] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.281454][T17600] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.290257][T17600] device bridge_slave_0 entered promiscuous mode [ 452.299206][T17600] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.333833][T17600] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.355293][T17600] device bridge_slave_1 entered promiscuous mode [ 452.408957][T17597] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 453.104359][T15788] Bluetooth: hci0: command 0x040f tx timeout [ 453.174398][T15788] Bluetooth: hci1: command 0x040f tx timeout [ 453.264305][T15788] Bluetooth: hci2: command 0x040f tx timeout 17:13:16 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:16 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 453.643963][T17597] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 454.510090][T17600] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 454.532925][T17595] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.541728][T17595] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.554319][T17595] device bridge_slave_0 entered promiscuous mode [ 455.184292][ T3561] Bluetooth: hci0: command 0x0419 tx timeout [ 455.254508][ T3561] Bluetooth: hci1: command 0x0419 tx timeout [ 455.334444][ T3561] Bluetooth: hci2: command 0x0419 tx timeout [ 455.441260][T17600] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 455.461047][T17595] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.476960][T17595] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.498741][T17595] device bridge_slave_1 entered promiscuous mode [ 455.517494][T17597] team0: Port device team_slave_0 added [ 457.324950][T17597] team0: Port device team_slave_1 added [ 459.837381][T17600] team0: Port device team_slave_0 added [ 459.845414][T17595] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 460.212540][T17597] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 460.229875][T17597] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 460.299905][T17597] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 460.335296][T17597] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 460.342251][T17597] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 460.419168][T17597] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 460.450639][T17600] team0: Port device team_slave_1 added [ 460.874743][T17595] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 462.416420][T17595] team0: Port device team_slave_0 added [ 462.423222][T17600] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 462.431432][T17600] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 462.514307][T17600] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 462.534805][T17600] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 462.541760][T17600] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 462.596438][T17600] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 466.181997][T17595] team0: Port device team_slave_1 added [ 468.373689][ T144] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 469.768223][T17597] device hsr_slave_0 entered promiscuous mode [ 469.913952][T17597] device hsr_slave_1 entered promiscuous mode [ 470.093936][T17597] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 470.114291][T17597] Cannot create hsr debugfs directory [ 470.637973][T17512] syz-executor.3 (17512) used greatest stack depth: 17720 bytes left [ 471.661724][ T144] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.817070][T17595] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 471.824040][T17595] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 471.924297][T17595] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 472.745161][T17600] device hsr_slave_0 entered promiscuous mode [ 472.891160][T17600] device hsr_slave_1 entered promiscuous mode [ 473.070155][T17600] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 473.077926][T17600] Cannot create hsr debugfs directory [ 473.087169][T17595] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 473.094115][T17595] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 473.160024][T17595] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 474.465987][ T144] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.507648][T17485] syz-executor.3 (17485) used greatest stack depth: 17152 bytes left [ 476.142595][ T144] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 477.397184][T17595] device hsr_slave_0 entered promiscuous mode [ 477.498283][T17595] device hsr_slave_1 entered promiscuous mode [ 477.539098][T17595] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 477.554285][T17595] Cannot create hsr debugfs directory 17:13:41 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:13:41 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 481.000900][ T144] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 481.564639][T17664] chnl_net:caif_netlink_parms(): no params data found [ 482.374446][ T3562] Bluetooth: hci4: command 0x0409 tx timeout [ 482.380561][ T3562] Bluetooth: hci3: command 0x0409 tx timeout [ 482.515915][ T144] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 482.623674][T17661] chnl_net:caif_netlink_parms(): no params data found [ 483.131653][ T144] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.888576][ T144] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.054128][T17664] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.064356][T17664] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.072859][T17664] device bridge_slave_0 entered promiscuous mode [ 484.454476][ T3562] Bluetooth: hci3: command 0x041b tx timeout [ 484.460578][ T3562] Bluetooth: hci4: command 0x041b tx timeout [ 484.592119][T17664] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.599825][T17664] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.608325][T17664] device bridge_slave_1 entered promiscuous mode [ 485.827475][T17664] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 485.858194][T17664] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 486.195990][T17661] bridge0: port 1(bridge_slave_0) entered blocking state [ 486.203233][T17661] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.234847][T17661] device bridge_slave_0 entered promiscuous mode [ 486.534503][ T3519] Bluetooth: hci4: command 0x040f tx timeout [ 486.554302][ T3519] Bluetooth: hci3: command 0x040f tx timeout [ 486.994390][T17661] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.001590][T17661] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.031613][T17661] device bridge_slave_1 entered promiscuous mode [ 487.068636][T17664] team0: Port device team_slave_0 added [ 487.555171][T17664] team0: Port device team_slave_1 added [ 488.614431][ T1069] Bluetooth: hci3: command 0x0419 tx timeout [ 488.620668][ T1069] Bluetooth: hci4: command 0x0419 tx timeout [ 488.976099][T17661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 489.052740][ T144] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 489.319159][T17661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 489.355053][T17664] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 489.364393][T17664] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 489.443617][T17664] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 489.504371][T17664] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 489.511335][T17664] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 489.554594][T17664] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 490.675530][ T144] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 491.168799][T17661] team0: Port device team_slave_0 added [ 493.249680][T17661] team0: Port device team_slave_1 added [ 493.774124][T17664] device hsr_slave_0 entered promiscuous mode [ 494.011633][T17664] device hsr_slave_1 entered promiscuous mode [ 494.205161][T17664] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 494.212758][T17664] Cannot create hsr debugfs directory [ 494.768201][ T144] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 495.189238][T17661] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 495.212726][T17661] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 495.280179][T17661] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 497.218024][T17661] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 497.234242][T17661] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 497.302401][T17661] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 497.629453][ T144] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 499.981373][T17661] device hsr_slave_0 entered promiscuous mode [ 500.146693][T17661] device hsr_slave_1 entered promiscuous mode [ 500.274439][T17661] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 500.282030][T17661] Cannot create hsr debugfs directory [ 501.266385][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.273307][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 511.875891][T17906] chnl_net:caif_netlink_parms(): no params data found [ 512.843405][T17906] bridge0: port 1(bridge_slave_0) entered blocking state [ 512.865378][T17906] bridge0: port 1(bridge_slave_0) entered disabled state [ 512.894442][T17906] device bridge_slave_0 entered promiscuous mode [ 513.254648][ T3562] Bluetooth: hci2: command 0x0409 tx timeout [ 513.609666][T17906] bridge0: port 2(bridge_slave_1) entered blocking state [ 513.624526][T17906] bridge0: port 2(bridge_slave_1) entered disabled state [ 513.643474][T17906] device bridge_slave_1 entered promiscuous mode [ 514.224419][T17906] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 514.368573][T17906] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 514.944517][ T1066] Bluetooth: hci5: command 0x0409 tx timeout [ 515.094316][ T3562] Bluetooth: hci6: command 0x0409 tx timeout [ 515.137366][T17906] team0: Port device team_slave_0 added [ 515.167628][T17906] team0: Port device team_slave_1 added [ 515.344336][ T3561] Bluetooth: hci2: command 0x041b tx timeout [ 516.596393][T17664] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 516.685060][T17906] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 516.692166][T17906] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 516.771203][T17906] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 517.024667][ T1066] Bluetooth: hci5: command 0x041b tx timeout [ 517.184449][ T1066] Bluetooth: hci6: command 0x041b tx timeout [ 517.424234][ T3534] Bluetooth: hci2: command 0x040f tx timeout [ 517.933926][T17906] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 517.941629][T17906] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 518.006256][T17906] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 518.640603][T17664] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 519.104460][ T1066] Bluetooth: hci5: command 0x040f tx timeout [ 519.254405][ T1066] Bluetooth: hci6: command 0x040f tx timeout [ 519.295315][T17906] device hsr_slave_0 entered promiscuous mode [ 519.395379][T17906] device hsr_slave_1 entered promiscuous mode [ 519.494280][ T1066] Bluetooth: hci2: command 0x0419 tx timeout [ 519.516068][T17906] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 519.523651][T17906] Cannot create hsr debugfs directory [ 519.553762][T17936] chnl_net:caif_netlink_parms(): no params data found [ 520.215539][T17664] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.642072][T17933] chnl_net:caif_netlink_parms(): no params data found [ 521.174465][ T1066] Bluetooth: hci5: command 0x0419 tx timeout [ 521.334493][ T1066] Bluetooth: hci6: command 0x0419 tx timeout [ 521.794891][T17664] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.084865][T17936] bridge0: port 1(bridge_slave_0) entered blocking state [ 524.091955][T17936] bridge0: port 1(bridge_slave_0) entered disabled state [ 524.135310][T17936] device bridge_slave_0 entered promiscuous mode [ 524.679624][T17936] bridge0: port 2(bridge_slave_1) entered blocking state [ 524.694479][T17936] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.702865][T17936] device bridge_slave_1 entered promiscuous mode [ 525.704643][T17933] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.711727][T17933] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.755383][T17933] device bridge_slave_0 entered promiscuous mode [ 527.033029][T17933] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.064331][T17933] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.072466][T17933] device bridge_slave_1 entered promiscuous mode [ 527.112458][T17936] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 527.145490][T17936] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 528.135254][T17933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 529.303002][T17936] team0: Port device team_slave_0 added [ 529.517441][T17933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 529.545383][T17936] team0: Port device team_slave_1 added [ 531.388633][T17933] team0: Port device team_slave_0 added [ 531.411659][T17936] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 531.432647][T17936] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 531.503102][T17936] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 531.536622][T17933] team0: Port device team_slave_1 added [ 531.543707][T17936] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 531.574390][T17936] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 531.631772][T17936] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 532.891106][T17933] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 532.904276][T17933] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 532.962136][T17933] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 533.362173][T17933] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 533.383926][T17933] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 533.482790][T17933] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 533.866846][T17936] device hsr_slave_0 entered promiscuous mode [ 533.975416][T17936] device hsr_slave_1 entered promiscuous mode [ 533.989412][T17936] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 534.024376][T17936] Cannot create hsr debugfs directory [ 534.787277][T17933] device hsr_slave_0 entered promiscuous mode [ 534.894785][T17933] device hsr_slave_1 entered promiscuous mode [ 534.994364][T17933] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 535.001956][T17933] Cannot create hsr debugfs directory [ 537.188631][T17664] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 537.964697][T17664] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 537.994492][T17664] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 538.030776][T17664] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 538.156918][T17906] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 538.191050][T17906] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 538.292217][T17906] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 538.402448][T17906] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 539.081328][T17661] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 539.295381][T17664] 8021q: adding VLAN 0 to HW filter on device bond0 [ 539.302321][T17661] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 539.364836][T17661] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 539.454975][T17661] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 539.636239][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 539.644007][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 539.668038][T17664] 8021q: adding VLAN 0 to HW filter on device team0 [ 540.104457][T17906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 540.147015][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 540.163110][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 540.187368][T17906] 8021q: adding VLAN 0 to HW filter on device team0 [ 540.205620][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 540.214676][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 540.245078][ T1066] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.252150][ T1066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 540.547636][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 540.565239][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 540.604866][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 540.613316][T15795] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.620606][T15795] bridge0: port 2(bridge_slave_1) entered forwarding state [ 540.674547][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 540.694229][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 540.724959][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 540.734124][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 540.754945][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 540.785568][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 540.804870][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 540.824835][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 542.871288][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 542.888461][T17906] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 542.944489][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 542.953402][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 543.228170][T17936] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 543.431817][T17936] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 544.973082][T17936] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 545.026646][T17936] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 545.056424][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 545.063910][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 545.086856][T17906] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 545.297666][T17933] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 545.459022][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 545.475937][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 545.519374][T17933] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 545.736857][T17933] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 545.769431][T17933] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 545.933853][T17906] device veth0_vlan entered promiscuous mode [ 545.973233][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 546.005135][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 546.051385][T17906] device veth1_vlan entered promiscuous mode [ 546.082034][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 546.091033][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 546.098881][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 546.145194][T17936] 8021q: adding VLAN 0 to HW filter on device bond0 [ 546.221684][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 546.240392][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 546.313706][T17906] device veth0_macvtap entered promiscuous mode [ 546.389957][T17936] 8021q: adding VLAN 0 to HW filter on device team0 [ 546.449814][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 546.459526][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 546.493181][T17906] device veth1_macvtap entered promiscuous mode [ 546.499994][T15788] Bluetooth: hci0: command 0x0409 tx timeout [ 546.534382][T17761] Bluetooth: hci1: command 0x0409 tx timeout [ 546.604840][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 546.614856][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 546.622852][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 546.696797][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 546.735462][T15788] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.742656][T15788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 546.803869][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 546.825066][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 546.864586][T15788] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.871684][T15788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 546.904579][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 546.921615][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 547.215725][T17906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 547.244399][T17906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.259367][T17906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 547.270882][T17906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.299534][T17906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 547.313998][T17906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.346261][T17906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 547.364221][T17906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.375854][T17906] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 547.388228][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 547.404789][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 547.413448][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 547.472534][T18155] chnl_net:caif_netlink_parms(): no params data found [ 547.615227][T17906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 547.654487][T17906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.684243][T17906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 547.724226][T17906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.734565][T17906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 547.754278][T17906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.779012][T17906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 547.804259][T17906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.815940][T17906] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 547.844223][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 547.853226][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 547.895290][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 547.920325][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 547.945065][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 547.979586][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 548.005808][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 548.022755][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 548.059446][T17936] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 548.085512][T17936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 548.232977][T17933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 548.267625][T18158] chnl_net:caif_netlink_parms(): no params data found [ 548.286956][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 548.305100][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 548.313635][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 548.395532][T17906] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 548.424246][T17906] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 548.432958][T17906] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 548.470007][T17906] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 548.534041][T17933] 8021q: adding VLAN 0 to HW filter on device team0 [ 548.544638][ T3534] Bluetooth: hci0: command 0x041b tx timeout [ 548.614652][T15784] Bluetooth: hci1: command 0x041b tx timeout [ 548.658240][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 548.674924][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 549.563247][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 549.578282][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 549.600140][ T3247] bridge0: port 1(bridge_slave_0) entered blocking state [ 549.607257][ T3247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 549.636185][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 550.219598][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 550.245044][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 550.253444][ T3534] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.260543][ T3534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 550.292093][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 550.319307][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 550.335270][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 550.352741][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 550.614407][ T3247] Bluetooth: hci0: command 0x040f tx timeout [ 550.704325][ T3247] Bluetooth: hci1: command 0x040f tx timeout [ 550.901326][T18155] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.914228][T18155] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.922651][T18155] device bridge_slave_0 entered promiscuous mode [ 550.953183][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 550.971116][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 550.982732][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 551.675320][T18155] bridge0: port 2(bridge_slave_1) entered blocking state [ 551.682395][T18155] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.715527][T18155] device bridge_slave_1 entered promiscuous mode [ 551.743312][T17936] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 551.776252][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 551.805154][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 551.813646][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 551.844874][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 551.853171][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 551.862344][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 552.083724][T13979] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 552.104277][T13979] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 552.248012][T17933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 552.270631][T18158] bridge0: port 1(bridge_slave_0) entered blocking state [ 552.294273][T18158] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.305628][T18158] device bridge_slave_0 entered promiscuous mode [ 552.335663][T18158] bridge0: port 2(bridge_slave_1) entered blocking state [ 552.354230][T18158] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.384685][T18158] device bridge_slave_1 entered promiscuous mode [ 552.402995][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 552.430273][T18155] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 552.467147][T18155] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 552.704436][ T3561] Bluetooth: hci0: command 0x0419 tx timeout [ 552.749651][T18158] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 552.784772][ T3247] Bluetooth: hci1: command 0x0419 tx timeout [ 553.136406][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 553.146954][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 553.171545][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 553.180114][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 553.215458][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 553.236871][T18158] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 553.402324][T18155] team0: Port device team_slave_0 added 17:14:56 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 554.019818][T18158] team0: Port device team_slave_0 added [ 554.055785][T18155] team0: Port device team_slave_1 added [ 554.100521][T17936] device veth0_vlan entered promiscuous mode [ 554.131995][T18158] team0: Port device team_slave_1 added [ 554.297877][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 554.314713][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 554.341444][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 554.367437][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 554.637766][T17933] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 554.717956][ T144] device hsr_slave_0 left promiscuous mode [ 554.834469][ T144] device hsr_slave_1 left promiscuous mode [ 554.866776][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 554.881463][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 554.922384][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 554.940295][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 554.989591][ T144] device bridge_slave_1 left promiscuous mode [ 555.010403][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.081714][ T144] device bridge_slave_0 left promiscuous mode [ 555.089261][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.165441][ T144] device hsr_slave_0 left promiscuous mode [ 555.177664][ T144] device hsr_slave_1 left promiscuous mode [ 555.304023][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 555.322989][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 555.360458][ T144] device bridge_slave_1 left promiscuous mode [ 555.382381][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.434926][ T144] device bridge_slave_0 left promiscuous mode [ 555.443523][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.558803][ T144] device hsr_slave_0 left promiscuous mode [ 555.568333][ T144] device hsr_slave_1 left promiscuous mode [ 555.784693][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 555.846889][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 555.952854][ T144] device bridge_slave_1 left promiscuous mode [ 555.976548][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.074842][ T144] device bridge_slave_0 left promiscuous mode [ 556.081057][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.496523][ T144] device hsr_slave_0 left promiscuous mode [ 556.724879][ T144] device hsr_slave_1 left promiscuous mode [ 556.864672][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 556.887725][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 556.904419][ T144] device bridge_slave_1 left promiscuous mode [ 556.920709][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 557.068657][ T144] device bridge_slave_0 left promiscuous mode [ 557.075809][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 557.558086][ T144] device hsr_slave_0 left promiscuous mode [ 557.681422][ T144] device hsr_slave_1 left promiscuous mode [ 557.831269][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 557.854371][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 557.989889][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 558.006589][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 558.126446][ T144] device bridge_slave_1 left promiscuous mode [ 558.132657][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.167070][ T144] device bridge_slave_0 left promiscuous mode [ 558.173277][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.209684][ T144] device hsr_slave_0 left promiscuous mode [ 558.226175][ T144] device hsr_slave_1 left promiscuous mode [ 558.243144][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 558.251014][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 558.263040][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 558.271667][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 558.282156][ T144] device bridge_slave_1 left promiscuous mode [ 558.305034][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.367542][ T144] device bridge_slave_0 left promiscuous mode [ 558.373735][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.806743][ T144] device veth1_macvtap left promiscuous mode [ 558.812792][ T144] device veth0_macvtap left promiscuous mode [ 558.844326][ T144] device veth1_vlan left promiscuous mode [ 558.850136][ T144] device veth0_vlan left promiscuous mode [ 558.918703][ T144] device veth1_macvtap left promiscuous mode [ 558.926184][ T144] device veth0_macvtap left promiscuous mode [ 558.932251][ T144] device veth1_vlan left promiscuous mode [ 558.974333][ T144] device veth0_vlan left promiscuous mode [ 559.118635][ T144] device veth1_macvtap left promiscuous mode [ 559.145148][ T144] device veth0_macvtap left promiscuous mode [ 559.151243][ T144] device veth1_vlan left promiscuous mode [ 559.174347][ T144] device veth0_vlan left promiscuous mode [ 562.695928][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.702227][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 563.786648][ T144] team0 (unregistering): Port device team_slave_1 removed [ 563.867605][ T144] team0 (unregistering): Port device team_slave_0 removed [ 563.882527][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 563.944649][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 564.462176][ T144] bond0 (unregistering): Released all slaves [ 565.005467][ T144] team0 (unregistering): Port device team_slave_1 removed [ 565.094314][ T144] team0 (unregistering): Port device team_slave_0 removed [ 565.130223][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 565.165259][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 565.530383][ T144] bond0 (unregistering): Released all slaves [ 565.755074][ T144] team0 (unregistering): Port device team_slave_1 removed [ 565.781360][ T144] team0 (unregistering): Port device team_slave_0 removed [ 565.825521][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 565.866823][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 566.048427][ T144] bond0 (unregistering): Released all slaves [ 566.216820][ T144] team0 (unregistering): Port device team_slave_1 removed [ 566.249966][ T144] team0 (unregistering): Port device team_slave_0 removed [ 566.280962][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 566.309370][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 566.455522][ T144] bond0 (unregistering): Released all slaves [ 566.795181][ T144] team0 (unregistering): Port device team_slave_1 removed [ 566.838236][ T144] team0 (unregistering): Port device team_slave_0 removed [ 566.879252][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 566.917933][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 567.143172][ T144] bond0 (unregistering): Released all slaves [ 567.434612][ T144] team0 (unregistering): Port device team_slave_1 removed [ 567.468610][ T144] team0 (unregistering): Port device team_slave_0 removed [ 567.496846][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 567.529378][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 567.674860][ T144] bond0 (unregistering): Released all slaves 17:15:10 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 567.785574][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 567.807062][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 567.821199][T18155] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 567.834960][T18155] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 567.865725][T18155] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 567.926786][T18158] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 567.954406][T18158] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 568.034286][T18158] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 568.067898][T17936] device veth1_vlan entered promiscuous mode [ 568.084390][T18155] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 568.091344][T18155] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 568.199772][T18155] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 568.235475][T18158] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 568.244941][T18158] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 568.333636][T18158] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 17:15:11 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 568.491025][T17936] device veth0_macvtap entered promiscuous mode [ 568.574900][T18155] device hsr_slave_0 entered promiscuous mode [ 568.597018][T18155] device hsr_slave_1 entered promiscuous mode [ 568.635036][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 568.652113][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 568.709604][T18158] device hsr_slave_0 entered promiscuous mode [ 568.735790][T18158] device hsr_slave_1 entered promiscuous mode [ 568.776113][T18158] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 568.783736][T18158] Cannot create hsr debugfs directory [ 568.810569][T17936] device veth1_macvtap entered promiscuous mode 17:15:11 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 568.873616][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 568.887346][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 569.062852][T17936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 569.094739][T17936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 569.115966][T17936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 569.146488][T17936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 569.177903][T17936] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 569.227154][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 569.246323][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 569.275668][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 569.312225][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 569.339729][T17933] device veth0_vlan entered promiscuous mode 17:15:12 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 569.446146][T17936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 569.474266][T17936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 569.507595][T17936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 569.554340][T17936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 569.575802][T17936] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 569.599681][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 569.613387][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 569.655528][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 569.681341][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 569.709318][T17933] device veth1_vlan entered promiscuous mode [ 569.779436][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 569.788678][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 569.813347][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 569.857614][T17936] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 569.899051][T17936] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 569.917510][T17936] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 569.958308][T17936] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 570.081916][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 17:15:12 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 570.164556][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 570.185078][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 570.225443][T17933] device veth0_macvtap entered promiscuous mode [ 570.316840][T17933] device veth1_macvtap entered promiscuous mode [ 570.361878][T17933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 570.384516][T17933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.395394][T17933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 570.424386][T17933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.444201][T17933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 570.464203][T17933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.485686][T17933] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 570.519136][T17933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 570.544611][T17933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.564218][T17933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 570.584316][T17933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.604249][T17933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 570.624189][T17933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.635751][T17933] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 570.646777][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 17:15:13 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 570.656185][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 570.664497][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 570.694141][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 570.703833][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 570.713600][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 570.744536][ T394] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 570.752583][ T394] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 570.769062][T17933] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 570.794266][T17933] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 570.803657][T17933] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 570.823336][T17933] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 570.849323][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 571.002339][ T5462] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 571.016870][ T5462] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:15:13 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:13 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") [ 571.052938][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:15:13 executing program 2: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") [ 571.211436][ T394] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 571.244877][ T394] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 571.270612][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 17:15:14 executing program 2: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") [ 571.355450][ T394] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 571.363430][ T394] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:15:14 executing program 2: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:14 executing program 2: syz_clone(0x80200, 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:14 executing program 2: syz_clone(0x80200, 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:14 executing program 2: syz_clone(0x80200, 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:14 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") [ 571.802211][T18158] netdevsim netdevsim1 netdevsim0: renamed from eth0 17:15:14 executing program 0: syz_clone(0x80200, 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:14 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") [ 571.867885][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 571.889206][T18158] netdevsim netdevsim1 netdevsim1: renamed from eth1 17:15:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xf8, 0x2, 0x9, 0x0, 0x74f, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:14 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:14 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) 17:15:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xf8, 0x2, 0x9, 0x0, 0x74f, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:14 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) 17:15:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x2, 0x9, 0x0, 0x74f, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:14 executing program 0: syz_clone(0x80200, 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x74f, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:14 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) 17:15:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74f, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:15 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 572.458712][T18158] netdevsim netdevsim1 netdevsim2: renamed from eth2 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 572.501270][T18158] netdevsim netdevsim1 netdevsim3: renamed from eth3 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:15 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:15 executing program 0: syz_clone(0x80200, 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:15 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 572.874395][T18158] 8021q: adding VLAN 0 to HW filter on device bond0 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 572.960668][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 572.969227][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.995922][T18158] 8021q: adding VLAN 0 to HW filter on device team0 [ 573.017946][T18155] netdevsim netdevsim3 netdevsim0: renamed from eth0 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:15 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514") 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 573.141242][T18155] netdevsim netdevsim3 netdevsim1: renamed from eth1 17:15:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:15 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) [ 573.240766][T18155] netdevsim netdevsim3 netdevsim2: renamed from eth2 17:15:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:16 executing program 0: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) [ 573.313106][T18155] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 573.332261][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 573.355404][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 573.378014][T17761] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.385131][T17761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.416457][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 17:15:16 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) 17:15:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 573.445085][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 573.478676][T17761] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.485895][T17761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 573.514610][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 17:15:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 573.570288][T18158] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 573.608788][T18158] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 573.643748][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 573.658519][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 17:15:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:16 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) [ 573.685801][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 573.725179][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 17:15:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 573.746721][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 573.785306][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 573.793813][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 17:15:16 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b89") 17:15:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 573.845353][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 573.853937][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 573.891552][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 17:15:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 573.955487][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 573.963461][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:15:16 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 574.089630][T18155] 8021q: adding VLAN 0 to HW filter on device bond0 17:15:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 574.139521][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 574.153703][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:15:16 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b89") [ 574.187712][T18155] 8021q: adding VLAN 0 to HW filter on device team0 [ 574.224608][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 574.233782][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 17:15:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 574.264898][T17761] bridge0: port 1(bridge_slave_0) entered blocking state [ 574.271980][T17761] bridge0: port 1(bridge_slave_0) entered forwarding state 17:15:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 574.345585][T18158] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 574.377998][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 574.387901][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 17:15:17 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) [ 574.403763][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 574.415506][ T3558] bridge0: port 2(bridge_slave_1) entered blocking state [ 574.422565][ T3558] bridge0: port 2(bridge_slave_1) entered forwarding state 17:15:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 574.456948][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 574.464539][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 574.472025][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 574.493238][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 17:15:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 574.516853][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 574.555322][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 17:15:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:17 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) [ 574.595268][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 574.604141][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 17:15:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 574.667484][T18155] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 574.696950][T18155] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 17:15:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 574.760123][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 574.777390][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 17:15:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 574.804671][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 574.816171][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 574.828403][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 574.841713][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 17:15:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 574.856051][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 17:15:17 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) [ 574.915810][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 574.939998][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 574.948367][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 574.976008][T18158] device veth0_vlan entered promiscuous mode [ 574.997959][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 575.009834][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 17:15:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 575.031819][T18158] device veth1_vlan entered promiscuous mode 17:15:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 575.127731][T18158] device veth0_macvtap entered promiscuous mode [ 575.155007][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 575.163515][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 17:15:17 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") [ 575.197353][T18158] device veth1_macvtap entered promiscuous mode [ 575.214751][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 17:15:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x0, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 575.244949][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 17:15:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 575.333295][T18155] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 575.385584][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 575.393071][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 575.418375][T18158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 17:15:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 575.436623][T18158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 575.460806][T18158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 17:15:18 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") [ 575.503587][T18158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 575.534492][T18158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 575.564469][T18158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 575.604259][T18158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 17:15:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 575.641060][T18158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 575.667885][T18158] batman_adv: batadv0: Interface activated: batadv_slave_0 17:15:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 575.738987][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 575.752919][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 17:15:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:18 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") [ 575.779654][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 575.814063][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 17:15:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 575.842781][T18158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 575.879803][T18158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:15:18 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 575.914288][T18158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 575.948216][T18158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:15:18 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c") [ 575.979624][T18158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 576.019419][T18158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 576.059266][T18158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 576.104282][T18158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 576.136799][T18158] batman_adv: batadv0: Interface activated: batadv_slave_1 17:15:18 executing program 4: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") [ 576.169896][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 576.186977][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 576.208328][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 576.236860][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 576.259454][T18155] device veth0_vlan entered promiscuous mode 17:15:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:19 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") [ 576.279735][T18158] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 576.301824][T18158] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 17:15:19 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 576.337630][T18158] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 576.354432][T18158] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 576.395723][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 576.403518][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 576.439991][T18155] device veth1_vlan entered promiscuous mode 17:15:19 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") [ 576.646324][T18155] device veth0_macvtap entered promiscuous mode 17:15:19 executing program 4: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") 17:15:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 576.718997][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 576.735049][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 576.797217][T18155] device veth1_macvtap entered promiscuous mode [ 576.813430][ T4209] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 576.814516][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 17:15:19 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") [ 576.844286][ T4209] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 576.853870][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 576.888060][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 576.911101][T18155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 576.935175][T18155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 576.962584][T18155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 576.985383][T18155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 577.015031][T18155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 17:15:19 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:19 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1") [ 577.052968][T18155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 577.092609][T18155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 577.138216][T18155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 577.175344][T18155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 17:15:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 577.201978][T18155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 577.221439][T18155] batman_adv: batadv0: Interface activated: batadv_slave_0 17:15:20 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1") [ 577.284900][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 577.293598][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 577.340474][T18155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 577.384210][T18155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 577.394069][T18155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 577.424212][T18155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 577.454861][T18155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 17:15:20 executing program 4: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da") [ 577.496274][T18155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 577.525455][T18155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 577.575325][T18155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 577.614337][T18155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 17:15:20 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1") [ 577.638651][T18155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:15:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 577.693285][T18155] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 577.719529][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 577.734980][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:15:20 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 577.781743][ T4209] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 577.793154][T18155] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 577.803917][ T4209] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 577.813362][T18155] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 577.874231][T18155] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 577.882955][T18155] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 17:15:20 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:20 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a07") [ 577.926585][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:15:20 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:20 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 578.238740][ T4209] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 578.252670][ T4209] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:15:21 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a07") [ 578.294135][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 578.338262][ T4209] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 578.350392][ T4209] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:15:21 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) [ 578.395861][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:15:21 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:21 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a07") 17:15:21 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:21 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:21 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a") 17:15:21 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:21 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:21 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a") 17:15:22 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:22 executing program 4: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a") 17:15:22 executing program 2: syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a") 17:15:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:22 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:22 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:22 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:22 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:22 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:22 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:23 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:23 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:23 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00'}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:23 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:23 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:23 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:24 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={0x0, 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:24 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:25 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:25 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:25 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:25 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdd, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:25 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xf, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:25 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:25 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:26 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x3, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x0, 0x0, 0x72f, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff30aa, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc88c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:15:30 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:30 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e0}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 17:15:30 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={0x0, 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:30 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xf, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:31 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={0x0, 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:31 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:31 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:31 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xf, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:32 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:32 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:32 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:32 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:32 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:32 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/241) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8800, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) 17:15:33 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x0, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:33 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:33 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:33 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:33 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:34 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:34 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000140)}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x18) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)='%-5lx \x00'}, 0x20) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@generic={&(0x7f0000000600)='./file0\x00', 0x0, 0x10}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x3f, 0x4d, 0x32, 0x50a, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0xa}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x24, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x3, 0x2, 0x0, 0x0, 0x1ff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @jmp={0x5, 0x1, 0xa, 0x1, 0x0, 0xfffffffffffffffc, 0x1}, @generic={0x7d, 0x3, 0x2, 0x7, 0x83d}, @ldst={0x0, 0x0, 0x1, 0x9, 0x7, 0x1, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000380)='syzkaller\x00', 0x74, 0x43, &(0x7f00000003c0)=""/67, 0x40f00, 0x70, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000480)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000700)=[r4, r5, r6, r7], &(0x7f0000000740)=[{0x3, 0x1, 0x3, 0x6}, {0x2, 0x3, 0x5, 0x7}, {0x1, 0x4, 0x2, 0x7}], 0x10, 0xe1}, 0x90) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r8, 0x400454d9, 0x0) 17:15:34 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x0, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:34 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x0, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:35 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:35 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001700)={&(0x7f0000000080), 0x6e, &(0x7f0000001640)=[{&(0x7f0000000100)=""/250, 0xfa}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/148, 0xffffffffffffff05}, {&(0x7f00000012c0)=""/214, 0xd6}, {&(0x7f00000013c0)=""/91, 0x5b}, {&(0x7f0000001440)=""/150, 0x96}, {&(0x7f0000001500)=""/51, 0x33}, {&(0x7f0000001540)=""/238, 0xee}], 0x8, &(0x7f0000001780)=ANY=[@ANYBLOB="2c00000000000000008e58ba13000000", @ANYRES32, @ANYRES32, @ANYRESDEC=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x30}, 0x40002000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000029c0)='cpu.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r2, &(0x7f0000002a00)={'full', 0x20, 0x1, 0x20, 0x5}, 0x2f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001740)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002a40)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000028c0)={0x11, 0xb, &(0x7f0000002ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1000}, [@map_fd={0x18, 0x1, 0x1, 0x0, r4}, @generic={0x4, 0x6, 0x9, 0x7, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000016c0)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000001840)=""/4096, 0x41000, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002840)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000002880)={0x0, 0x9, 0x5, 0x4}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000002980)=r5, 0x4) ioctl$TUNSETQUEUE(r1, 0x400454d9, 0x0) 17:15:35 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x0, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:35 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:35 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x0, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:35 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:36 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:36 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:36 executing program 0: socketpair(0x23, 0x0, 0x0, &(0x7f0000000a80)) 17:15:36 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:37 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:37 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x0, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") 17:15:37 executing program 0: socketpair(0x23, 0x0, 0x0, &(0x7f0000000a80)) 17:15:37 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:37 executing program 0: socketpair(0x23, 0x0, 0x0, &(0x7f0000000a80)) 17:15:38 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:38 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a80)) 17:15:38 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:38 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:38 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:39 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a80)) 17:15:39 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:40 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:40 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:40 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:41 executing program 4: socketpair(0xa, 0x3, 0x3, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@ll={0x11, 0x16, 0x0, 0x1, 0x7}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="a009f4810bdc6bf21e125624b16108809c17d315be092daf489b4f2e6ed560dd2ff904be706bda231a0e43fc283ed2803f64a1724ed17570b904e0ac316aeda4621c0f7c32d327155ca0269987949e924e03aa889abd5aa315647e8fbfba9d22f41ea37ab0b2b0b4a45c1fc6d94d15c9d3837e775ce9a3d361a01eaaba48e8d679d174c6b2", 0x85}, {&(0x7f00000001c0)="cc956e648a7895ced603d151f8766c209fb68916c8442454c3417daeb1ee672bd140d87731bf81676b1a25da9d5e0bddf028fee50157775d179f6d058bc53d9e875a48cfb4b821dc9a43841cdf9e03adaca92223abc928cf1a2daf99f972a69fefcf77290ee998d72afc7599bebaba9572bec83ecb526ff6f6d3affcc1fc154c22e1bde81ea13549e0e020b443a45c0d399334211a34310bc7252ed5f8e2199f76273ec549d48651351d2fbb498b48f380609cdc", 0xb4}], 0x2, &(0x7f00000002c0)=[{0x98, 0x10e, 0x8, "5cf9d01df03e355fd11af8903307ff4124e877d3b1b3aaeaadef5a1d655d6eade16ac7d8a131b78c0474e30dd962f1e6472e1a5d14c2a504181be9afa20cd541232367c633d1cee25160e3f25661bc7ef1ef8ead058e7e0b743e3d3e6ba88e1f19f1f7f57ac3d0d37ab8fca4abf41796b133924420d7bab279f3a0d2604100280e55d14c4361"}, {0x78, 0x115, 0x905, "d34488e008ba32cd6fe76a760dc8e894a544543218fd731febc68a71438843d021c3975d02a1dcf12583e8d1f5a7982b130bb9d02a0bcfb22612ed85db8efbdf328c751abd5e33dd711bc01c05365780ef41ade220adec32d710598fcd7faf56b345b8a825bc0508"}], 0x110}, 0x4011) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 17:15:41 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:42 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:42 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:42 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xba, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.events.local\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x13, 0x0, 0x10001, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=r1, r2, 0x2d, 0x0, r3, @link_fd=r4, r5}, 0x20) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) ioctl$TUNGETFILTER(r6, 0x801054db, &(0x7f0000000200)=""/162) 17:15:42 executing program 4: socketpair(0xa, 0x3, 0x3, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@ll={0x11, 0x16, 0x0, 0x1, 0x7}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="a009f4810bdc6bf21e125624b16108809c17d315be092daf489b4f2e6ed560dd2ff904be706bda231a0e43fc283ed2803f64a1724ed17570b904e0ac316aeda4621c0f7c32d327155ca0269987949e924e03aa889abd5aa315647e8fbfba9d22f41ea37ab0b2b0b4a45c1fc6d94d15c9d3837e775ce9a3d361a01eaaba48e8d679d174c6b2", 0x85}, {&(0x7f00000001c0)="cc956e648a7895ced603d151f8766c209fb68916c8442454c3417daeb1ee672bd140d87731bf81676b1a25da9d5e0bddf028fee50157775d179f6d058bc53d9e875a48cfb4b821dc9a43841cdf9e03adaca92223abc928cf1a2daf99f972a69fefcf77290ee998d72afc7599bebaba9572bec83ecb526ff6f6d3affcc1fc154c22e1bde81ea13549e0e020b443a45c0d399334211a34310bc7252ed5f8e2199f76273ec549d48651351d2fbb498b48f380609cdc", 0xb4}], 0x2, &(0x7f00000002c0)=[{0x98, 0x10e, 0x8, "5cf9d01df03e355fd11af8903307ff4124e877d3b1b3aaeaadef5a1d655d6eade16ac7d8a131b78c0474e30dd962f1e6472e1a5d14c2a504181be9afa20cd541232367c633d1cee25160e3f25661bc7ef1ef8ead058e7e0b743e3d3e6ba88e1f19f1f7f57ac3d0d37ab8fca4abf41796b133924420d7bab279f3a0d2604100280e55d14c4361"}, {0x78, 0x115, 0x905, "d34488e008ba32cd6fe76a760dc8e894a544543218fd731febc68a71438843d021c3975d02a1dcf12583e8d1f5a7982b130bb9d02a0bcfb22612ed85db8efbdf328c751abd5e33dd711bc01c05365780ef41ade220adec32d710598fcd7faf56b345b8a825bc0508"}], 0x110}, 0x4011) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 17:15:43 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x10, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:43 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:43 executing program 4: socketpair(0xa, 0x3, 0x3, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@ll={0x11, 0x16, 0x0, 0x1, 0x7}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="a009f4810bdc6bf21e125624b16108809c17d315be092daf489b4f2e6ed560dd2ff904be706bda231a0e43fc283ed2803f64a1724ed17570b904e0ac316aeda4621c0f7c32d327155ca0269987949e924e03aa889abd5aa315647e8fbfba9d22f41ea37ab0b2b0b4a45c1fc6d94d15c9d3837e775ce9a3d361a01eaaba48e8d679d174c6b2", 0x85}, {&(0x7f00000001c0)="cc956e648a7895ced603d151f8766c209fb68916c8442454c3417daeb1ee672bd140d87731bf81676b1a25da9d5e0bddf028fee50157775d179f6d058bc53d9e875a48cfb4b821dc9a43841cdf9e03adaca92223abc928cf1a2daf99f972a69fefcf77290ee998d72afc7599bebaba9572bec83ecb526ff6f6d3affcc1fc154c22e1bde81ea13549e0e020b443a45c0d399334211a34310bc7252ed5f8e2199f76273ec549d48651351d2fbb498b48f380609cdc", 0xb4}], 0x2, &(0x7f00000002c0)=[{0x98, 0x10e, 0x8, "5cf9d01df03e355fd11af8903307ff4124e877d3b1b3aaeaadef5a1d655d6eade16ac7d8a131b78c0474e30dd962f1e6472e1a5d14c2a504181be9afa20cd541232367c633d1cee25160e3f25661bc7ef1ef8ead058e7e0b743e3d3e6ba88e1f19f1f7f57ac3d0d37ab8fca4abf41796b133924420d7bab279f3a0d2604100280e55d14c4361"}, {0x78, 0x115, 0x905, "d34488e008ba32cd6fe76a760dc8e894a544543218fd731febc68a71438843d021c3975d02a1dcf12583e8d1f5a7982b130bb9d02a0bcfb22612ed85db8efbdf328c751abd5e33dd711bc01c05365780ef41ade220adec32d710598fcd7faf56b345b8a825bc0508"}], 0x110}, 0x4011) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 17:15:43 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x10, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:43 executing program 4: socketpair(0xa, 0x3, 0x3, &(0x7f0000000040)) 17:15:44 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xba, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.events.local\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x13, 0x0, 0x10001, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=r1, r2, 0x2d, 0x0, r3, @link_fd=r4, r5}, 0x20) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) ioctl$TUNGETFILTER(r6, 0x801054db, &(0x7f0000000200)=""/162) 17:15:44 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:15:44 executing program 4: socketpair(0x0, 0x3, 0x3, &(0x7f0000000040)) [ 611.918804][ T144] device hsr_slave_0 left promiscuous mode [ 611.946952][ T144] device hsr_slave_1 left promiscuous mode [ 612.106031][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 612.271086][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 612.569109][ T144] device bridge_slave_1 left promiscuous mode [ 612.575431][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 612.934504][ T144] device bridge_slave_0 left promiscuous mode [ 612.940722][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.041557][ T144] device hsr_slave_0 left promiscuous mode [ 613.380043][ T144] device hsr_slave_1 left promiscuous mode [ 613.511716][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 613.590742][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 613.786331][ T144] device bridge_slave_1 left promiscuous mode [ 613.792790][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.040229][ T144] device bridge_slave_0 left promiscuous mode [ 614.054468][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.536253][ T144] device hsr_slave_0 left promiscuous mode [ 614.837810][ T144] device hsr_slave_1 left promiscuous mode [ 615.071201][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 615.133425][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 615.258357][ T144] device bridge_slave_1 left promiscuous mode [ 615.293973][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.408570][ T144] device bridge_slave_0 left promiscuous mode [ 615.419941][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.268674][ T144] device hsr_slave_0 left promiscuous mode [ 616.449555][ T144] device hsr_slave_1 left promiscuous mode [ 616.603392][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 616.687881][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 616.816334][ T144] device bridge_slave_1 left promiscuous mode [ 616.822747][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.940794][ T144] device bridge_slave_0 left promiscuous mode [ 616.956738][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.606836][ T144] device hsr_slave_0 left promiscuous mode [ 617.810254][ T144] device hsr_slave_1 left promiscuous mode [ 618.026358][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 618.051736][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 618.148269][ T144] device bridge_slave_1 left promiscuous mode [ 618.184352][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.314674][ T144] device bridge_slave_0 left promiscuous mode [ 618.320896][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.592787][ T144] device hsr_slave_0 left promiscuous mode [ 618.710253][ T144] device hsr_slave_1 left promiscuous mode [ 618.779511][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 618.803151][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 618.886411][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 618.893851][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 618.981713][ T144] device bridge_slave_1 left promiscuous mode [ 618.992930][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 619.235041][ T144] device bridge_slave_0 left promiscuous mode [ 619.241252][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.849235][ T144] device veth1_macvtap left promiscuous mode [ 619.864723][ T144] device veth0_macvtap left promiscuous mode [ 619.870791][ T144] device veth1_vlan left promiscuous mode [ 619.904947][ T144] device veth0_vlan left promiscuous mode [ 621.356274][ T144] team0 (unregistering): Port device team_slave_1 removed [ 621.421416][ T144] team0 (unregistering): Port device team_slave_0 removed [ 621.501202][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 17:16:04 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a80)) [ 621.624534][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 621.801023][ T144] bond0 (unregistering): Released all slaves [ 622.007485][ T144] team0 (unregistering): Port device team_slave_1 removed [ 622.021582][ T144] team0 (unregistering): Port device team_slave_0 removed [ 622.033959][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 622.047506][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 622.099998][ T144] bond0 (unregistering): Released all slaves [ 622.217475][ T144] team0 (unregistering): Port device team_slave_1 removed [ 622.230937][ T144] team0 (unregistering): Port device team_slave_0 removed [ 622.241888][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 622.256115][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 622.311781][ T144] bond0 (unregistering): Released all slaves [ 622.410922][ T144] team0 (unregistering): Port device team_slave_1 removed [ 622.423573][ T144] team0 (unregistering): Port device team_slave_0 removed [ 622.436630][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 622.449948][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 622.511420][ T144] bond0 (unregistering): Released all slaves [ 622.606853][ T144] team0 (unregistering): Port device team_slave_1 removed [ 622.618333][ T144] team0 (unregistering): Port device team_slave_0 removed [ 622.633665][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 622.649906][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 622.719246][ T144] bond0 (unregistering): Released all slaves [ 622.917193][ T144] team0 (unregistering): Port device team_slave_1 removed [ 622.943730][ T144] team0 (unregistering): Port device team_slave_0 removed [ 622.957392][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 622.972201][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 623.072547][ T144] bond0 (unregistering): Released all slaves [ 623.313383][T19223] chnl_net:caif_netlink_parms(): no params data found [ 623.578088][T19220] chnl_net:caif_netlink_parms(): no params data found [ 623.601343][T19223] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.608634][T19223] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.617050][T19223] device bridge_slave_0 entered promiscuous mode [ 623.638956][T19223] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.646701][T19223] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.656136][T19223] device bridge_slave_1 entered promiscuous mode [ 623.697108][T19223] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 623.723222][T19223] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 623.764852][T19220] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.772600][T19220] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.783316][T19220] device bridge_slave_0 entered promiscuous mode [ 623.792954][T19223] team0: Port device team_slave_0 added [ 623.801839][T19223] team0: Port device team_slave_1 added [ 623.807833][T19220] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.815247][T19220] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.822891][T19220] device bridge_slave_1 entered promiscuous mode [ 623.864802][T19223] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 623.871773][T19223] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 623.898128][T19223] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 623.924999][T19223] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 623.931991][T19223] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 623.959240][T19223] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 623.973339][T19220] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 624.003308][T19220] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 624.018294][T19223] device hsr_slave_0 entered promiscuous mode [ 624.025368][T19223] device hsr_slave_1 entered promiscuous mode [ 624.031825][T19223] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 624.043863][T19223] Cannot create hsr debugfs directory [ 624.092083][T19220] team0: Port device team_slave_0 added [ 624.111763][T19220] team0: Port device team_slave_1 added [ 624.137399][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.143689][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 624.252713][T19220] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 624.259983][T19220] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 624.300941][T19220] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 624.376100][T19220] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 624.383060][T19220] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 624.423915][T19220] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 624.464776][T19223] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 624.556725][T19220] device hsr_slave_0 entered promiscuous mode [ 624.563979][T19220] device hsr_slave_1 entered promiscuous mode [ 624.585571][T19220] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 624.614414][T19220] Cannot create hsr debugfs directory [ 624.625675][T19223] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 624.751681][T19223] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 624.863139][T19223] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 624.944236][T15784] Bluetooth: hci0: command 0x0409 tx timeout [ 625.083270][T19223] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 625.092404][T19223] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 625.094431][ T3560] Bluetooth: hci1: command 0x0409 tx timeout [ 625.118358][T19220] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 625.156236][T19223] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 625.164711][T19223] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 625.211628][T19220] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 625.259804][T19220] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 625.295568][T19238] chnl_net:caif_netlink_parms(): no params data found [ 625.346103][T19220] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 625.508777][T19223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 625.515904][T19238] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.522968][T19238] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.532106][T19238] device bridge_slave_0 entered promiscuous mode [ 625.542617][T19239] chnl_net:caif_netlink_parms(): no params data found [ 625.597648][T19238] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.605340][T19238] bridge0: port 2(bridge_slave_1) entered disabled state [ 625.613004][T19238] device bridge_slave_1 entered promiscuous mode [ 625.623218][T19242] chnl_net:caif_netlink_parms(): no params data found [ 625.635585][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 625.643186][T15788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 625.652966][T19223] 8021q: adding VLAN 0 to HW filter on device team0 [ 625.729774][T19239] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.737703][T19239] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.746417][T19239] device bridge_slave_0 entered promiscuous mode [ 625.754022][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 625.762679][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 625.771446][ T1066] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.778534][ T1066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 625.800902][T19238] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 625.810541][T19239] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.818017][T19239] bridge0: port 2(bridge_slave_1) entered disabled state [ 625.826283][T19239] device bridge_slave_1 entered promiscuous mode [ 625.851055][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 625.859101][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 625.868114][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 625.876650][T15791] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.883690][T15791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 625.892478][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 625.906356][T19238] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 625.943990][T19220] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 625.971684][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 625.981977][T19238] team0: Port device team_slave_0 added [ 625.992265][T19239] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 626.001977][T19220] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 626.022662][T19242] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.030359][T19242] bridge0: port 1(bridge_slave_0) entered disabled state [ 626.039661][T19242] device bridge_slave_0 entered promiscuous mode [ 626.049836][T19238] team0: Port device team_slave_1 added [ 626.059334][T19239] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 626.068924][T19220] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 626.085374][T19220] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 626.107272][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 626.116162][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 626.129757][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 626.138428][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 626.147070][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 626.156528][T19242] bridge0: port 2(bridge_slave_1) entered blocking state [ 626.163573][T19242] bridge0: port 2(bridge_slave_1) entered disabled state [ 626.171934][T19242] device bridge_slave_1 entered promiscuous mode [ 626.206659][T19239] team0: Port device team_slave_0 added [ 626.239264][T19238] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 626.246972][T19238] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 626.273346][T19238] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 626.287229][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 626.296869][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 626.315993][T19239] team0: Port device team_slave_1 added [ 626.334483][T19242] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 626.352191][T19242] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 626.361615][T19238] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 626.368837][T19238] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 626.395771][T19238] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 626.416208][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 626.424624][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 626.433166][T19223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 626.479490][T19239] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 626.493104][T19239] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 626.522181][T19239] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 626.535468][T19239] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 626.542505][T19239] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 626.569327][T19239] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 626.585156][T19242] team0: Port device team_slave_0 added [ 626.640378][T19242] team0: Port device team_slave_1 added [ 626.683307][T19242] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 626.690642][T19242] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 626.718153][T19242] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 626.734028][T19238] device hsr_slave_0 entered promiscuous mode [ 626.746147][T19238] device hsr_slave_1 entered promiscuous mode [ 626.755925][T19238] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 626.763486][T19238] Cannot create hsr debugfs directory [ 626.804497][T19242] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 626.811925][T19242] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 626.849927][T19242] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 626.899695][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 626.907542][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 626.920439][T19239] device hsr_slave_0 entered promiscuous mode [ 626.927558][T19239] device hsr_slave_1 entered promiscuous mode [ 626.934103][T19239] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 626.942059][T15784] Bluetooth: hci2: command 0x0409 tx timeout [ 626.948922][T19239] Cannot create hsr debugfs directory [ 626.959200][T19223] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 627.014501][ T3519] Bluetooth: hci3: command 0x0409 tx timeout [ 627.024674][T15784] Bluetooth: hci0: command 0x041b tx timeout [ 627.044352][T19220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 627.094505][T15788] Bluetooth: hci4: command 0x0409 tx timeout [ 627.148655][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 627.168714][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 627.185596][T19220] 8021q: adding VLAN 0 to HW filter on device team0 [ 627.205180][T17759] Bluetooth: hci1: command 0x041b tx timeout [ 627.232565][T19242] device hsr_slave_0 entered promiscuous mode [ 627.250948][T19242] device hsr_slave_1 entered promiscuous mode [ 627.262793][T19242] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 627.281850][T19242] Cannot create hsr debugfs directory [ 627.325958][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 627.344997][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.363778][ T3519] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.370870][ T3519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.389800][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 627.404116][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 627.412656][ T3519] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.419742][ T3519] bridge0: port 2(bridge_slave_1) entered forwarding state [ 627.446348][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 627.520387][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 627.530032][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 627.550199][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 627.568246][T19223] device veth0_vlan entered promiscuous mode [ 627.618175][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 627.626931][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 627.636839][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 627.653296][T19223] device veth1_vlan entered promiscuous mode [ 627.684919][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 627.692687][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 627.701335][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 627.709561][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 627.718321][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 627.727028][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 627.736450][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 627.745165][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 627.753461][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 627.806732][T19239] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 627.819663][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 627.828486][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 627.837068][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 627.845968][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 627.855493][T19220] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 627.871481][T19223] device veth0_macvtap entered promiscuous mode [ 627.920521][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 627.929713][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 627.944093][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 627.958822][T19239] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 627.984901][T19223] device veth1_macvtap entered promiscuous mode [ 628.030659][T19239] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 628.061710][T19223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 628.084338][T19223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 628.101582][T19223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 628.112360][T19223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 628.122559][T19223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 628.133890][T19223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 628.144852][T19223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 628.156268][T19223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 628.166340][T19223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 628.177444][T19223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 628.189042][T19223] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 628.200305][T19223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 628.210911][T19223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 628.220986][T19223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 628.231449][T19223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 628.241664][T19223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 628.252845][T19223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 628.262685][T19223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 628.273627][T19223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 628.283862][T19223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 628.294632][T19223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 628.306174][T19223] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 628.313614][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 628.321768][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 628.330698][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 628.340021][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 628.351675][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 628.365314][T19239] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 628.393734][T19220] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 628.421552][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 628.434823][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 628.444100][T19223] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 628.453437][T19223] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 628.468754][T19223] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 628.477944][T19223] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 628.504550][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 628.526028][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 628.581837][T19238] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 628.618590][T19220] device veth0_vlan entered promiscuous mode [ 628.628614][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 628.640525][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 628.649574][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 628.658532][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 628.684010][T19238] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 628.709478][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 628.716382][T19220] device veth1_vlan entered promiscuous mode [ 628.718960][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 628.744786][T19238] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 628.770979][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 628.779240][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 628.787810][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 628.803228][ T4209] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 628.814011][ T4209] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 628.826645][T19238] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 628.846815][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 628.855177][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 628.864977][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 628.882566][ T144] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 17:16:11 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 628.899345][T19220] device veth0_macvtap entered promiscuous mode [ 628.949801][ T144] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 628.982209][T19220] device veth1_macvtap entered promiscuous mode 17:16:11 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8", 0x13, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 629.014953][T17759] Bluetooth: hci2: command 0x041b tx timeout [ 629.018909][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 629.034341][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.046032][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 629.057334][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.068608][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 629.079168][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.089134][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 629.094357][ T13] Bluetooth: hci0: command 0x040f tx timeout [ 629.099877][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.115485][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 629.124431][ T13] Bluetooth: hci3: command 0x041b tx timeout [ 629.126385][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.141695][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 629.152817][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.165224][T19220] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 629.181532][ T144] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 629.192378][ T3534] Bluetooth: hci4: command 0x041b tx timeout [ 629.205202][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 629.213348][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 629.221695][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 629.244946][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 629.255770][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 629.268097][T15784] Bluetooth: hci1: command 0x040f tx timeout [ 629.275366][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.286351][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 629.297042][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.307699][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 629.318522][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.328847][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 629.339913][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.350223][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 629.364245][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 629.385050][T19220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 629.395741][T19220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:16:12 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8", 0x13, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 629.416525][T19220] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 629.431113][ T144] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 629.476988][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 629.485682][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 629.506993][T19220] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 629.517173][T19220] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 629.527316][T19220] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 629.544172][T19220] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 17:16:12 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8", 0x13, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 629.773001][ T4209] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 629.796577][ T4209] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 629.925551][T19238] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 629.944276][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 629.968994][T19238] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 629.986160][T15397] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 629.999318][T15397] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 630.018820][T19238] netdevsim netdevsim2 netdevsim2: renamed from eth2 17:16:12 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a80)) [ 630.046275][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 630.078286][T19238] netdevsim netdevsim2 netdevsim3: renamed from eth3 17:16:12 executing program 0: socketpair(0x23, 0x0, 0x0, 0x0) 17:16:12 executing program 0: socketpair(0x23, 0x0, 0x0, 0x0) 17:16:13 executing program 0: socketpair(0x23, 0x0, 0x0, 0x0) 17:16:13 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:13 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8", 0x13, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:13 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:13 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xb, 0x21, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x35ee3d44, 0x5a, &(0x7f00000018c0)=""/90, 0x40f00, 0x21, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x5, 0x3, 0x726e5b30, 0xfffffffe}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000001980)=[r0, r0, r0, r0], &(0x7f00000019c0)=[{0x3, 0x4, 0x0, 0x850e18ec29db9d30}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x6}, {0x2, 0x1, 0x4, 0x4}], 0x10, 0x7fff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0x59, &(0x7f0000001ac0)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f0000000200), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0x42, '\x00', r2, r3, 0x2, 0x5, 0x4}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r3, 0x20, &(0x7f0000000600)={&(0x7f00000008c0)=""/4096, 0x1000, 0x0, &(0x7f0000000540)=""/164, 0xa4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=r4, 0x4) r5 = socket$kcm(0x29, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000040)={r6}) 17:16:13 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff", 0x14, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 630.986010][T19238] 8021q: adding VLAN 0 to HW filter on device bond0 [ 631.118448][T15789] Bluetooth: hci2: command 0x040f tx timeout 17:16:13 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xb, 0x21, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x35ee3d44, 0x5a, &(0x7f00000018c0)=""/90, 0x40f00, 0x21, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x5, 0x3, 0x726e5b30, 0xfffffffe}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000001980)=[r0, r0, r0, r0], &(0x7f00000019c0)=[{0x3, 0x4, 0x0, 0x850e18ec29db9d30}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x6}, {0x2, 0x1, 0x4, 0x4}], 0x10, 0x7fff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0x59, &(0x7f0000001ac0)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f0000000200), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0x42, '\x00', r2, r3, 0x2, 0x5, 0x4}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r3, 0x20, &(0x7f0000000600)={&(0x7f00000008c0)=""/4096, 0x1000, 0x0, &(0x7f0000000540)=""/164, 0xa4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=r4, 0x4) r5 = socket$kcm(0x29, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000040)={r6}) [ 631.192105][T15789] Bluetooth: hci3: command 0x040f tx timeout [ 631.200974][T15789] Bluetooth: hci0: command 0x0419 tx timeout [ 631.221856][T19238] 8021q: adding VLAN 0 to HW filter on device team0 [ 631.265031][ T3534] Bluetooth: hci4: command 0x040f tx timeout [ 631.271117][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 631.294798][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 631.335328][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 631.344000][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 631.366929][ T3247] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.373998][ T3247] bridge0: port 1(bridge_slave_0) entered forwarding state 17:16:14 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xb, 0x21, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x35ee3d44, 0x5a, &(0x7f00000018c0)=""/90, 0x40f00, 0x21, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x5, 0x3, 0x726e5b30, 0xfffffffe}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000001980)=[r0, r0, r0, r0], &(0x7f00000019c0)=[{0x3, 0x4, 0x0, 0x850e18ec29db9d30}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x6}, {0x2, 0x1, 0x4, 0x4}], 0x10, 0x7fff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0x59, &(0x7f0000001ac0)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f0000000200), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0x42, '\x00', r2, r3, 0x2, 0x5, 0x4}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r3, 0x20, &(0x7f0000000600)={&(0x7f00000008c0)=""/4096, 0x1000, 0x0, &(0x7f0000000540)=""/164, 0xa4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=r4, 0x4) r5 = socket$kcm(0x29, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000040)={r6}) [ 631.404647][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 631.413365][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 631.441720][ T3247] bridge0: port 2(bridge_slave_1) entered blocking state [ 631.448853][ T3247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 631.484624][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 631.493422][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 631.527451][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 631.565595][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 17:16:14 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xb, 0x21, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x35ee3d44, 0x5a, &(0x7f00000018c0)=""/90, 0x40f00, 0x21, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x5, 0x3, 0x726e5b30, 0xfffffffe}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000001980)=[r0, r0, r0, r0], &(0x7f00000019c0)=[{0x3, 0x4, 0x0, 0x850e18ec29db9d30}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x6}, {0x2, 0x1, 0x4, 0x4}], 0x10, 0x7fff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0x59, &(0x7f0000001ac0)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f0000000200), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0x42, '\x00', r2, r3, 0x2, 0x5, 0x4}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r3, 0x20, &(0x7f0000000600)={&(0x7f00000008c0)=""/4096, 0x1000, 0x0, &(0x7f0000000540)=""/164, 0xa4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=r4, 0x4) socket$kcm(0x29, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 631.594754][ T3534] Bluetooth: hci1: command 0x0419 tx timeout [ 631.603904][T19239] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 631.713147][T19238] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 631.745330][T19238] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 17:16:14 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xb, 0x21, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x35ee3d44, 0x5a, &(0x7f00000018c0)=""/90, 0x40f00, 0x21, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x5, 0x3, 0x726e5b30, 0xfffffffe}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000001980)=[r0, r0, r0, r0], &(0x7f00000019c0)=[{0x3, 0x4, 0x0, 0x850e18ec29db9d30}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x6}, {0x2, 0x1, 0x4, 0x4}], 0x10, 0x7fff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0x59, &(0x7f0000001ac0)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f0000000200), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0x42, '\x00', r2, r3, 0x2, 0x5, 0x4}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r3, 0x20, &(0x7f0000000600)={&(0x7f00000008c0)=""/4096, 0x1000, 0x0, &(0x7f0000000540)=""/164, 0xa4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=r4, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 631.779827][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 631.788707][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 631.807105][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 631.835180][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 631.844972][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 631.874805][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 17:16:14 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff", 0x14, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 631.883530][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 631.894963][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 631.924225][T19239] netdevsim netdevsim1 netdevsim1: renamed from eth1 17:16:14 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xb, 0x21, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x35ee3d44, 0x5a, &(0x7f00000018c0)=""/90, 0x40f00, 0x21, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x5, 0x3, 0x726e5b30, 0xfffffffe}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000001980)=[r0, r0, r0, r0], &(0x7f00000019c0)=[{0x3, 0x4, 0x0, 0x850e18ec29db9d30}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x6}, {0x2, 0x1, 0x4, 0x4}], 0x10, 0x7fff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0x59, &(0x7f0000001ac0)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f0000000200), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0x42, '\x00', r2, r3, 0x2, 0x5, 0x4}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r3, 0x20, &(0x7f0000000600)={&(0x7f00000008c0)=""/4096, 0x1000, 0x0, &(0x7f0000000540)=""/164, 0xa4}}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 631.986760][T19239] netdevsim netdevsim1 netdevsim2: renamed from eth2 17:16:14 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xb, 0x21, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x35ee3d44, 0x5a, &(0x7f00000018c0)=""/90, 0x40f00, 0x21, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x5, 0x3, 0x726e5b30, 0xfffffffe}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000001980)=[r0, r0, r0, r0], &(0x7f00000019c0)=[{0x3, 0x4, 0x0, 0x850e18ec29db9d30}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x6}, {0x2, 0x1, 0x4, 0x4}], 0x10, 0x7fff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0x59, &(0x7f0000001ac0)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f0000000200), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0x42, '\x00', r2, r3, 0x2, 0x5, 0x4}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 632.066808][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 632.085660][T19242] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 632.143915][T19239] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 632.192569][T19242] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 632.207426][T19242] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 632.242191][T19242] netdevsim netdevsim4 netdevsim3: renamed from eth3 17:16:15 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xb, 0x21, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x35ee3d44, 0x5a, &(0x7f00000018c0)=""/90, 0x40f00, 0x21, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x5, 0x3, 0x726e5b30, 0xfffffffe}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000001980)=[r0, r0, r0, r0], &(0x7f00000019c0)=[{0x3, 0x4, 0x0, 0x850e18ec29db9d30}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x6}, {0x2, 0x1, 0x4, 0x4}], 0x10, 0x7fff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0x59, &(0x7f0000001ac0)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f0000000200), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 17:16:15 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff", 0x14, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:15 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xb, 0x21, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x35ee3d44, 0x5a, &(0x7f00000018c0)=""/90, 0x40f00, 0x21, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x5, 0x3, 0x726e5b30, 0xfffffffe}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000001980)=[r0, r0, r0, r0], &(0x7f00000019c0)=[{0x3, 0x4, 0x0, 0x850e18ec29db9d30}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x6}, {0x2, 0x1, 0x4, 0x4}], 0x10, 0x7fff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0x59, &(0x7f0000001ac0)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f0000000200), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 17:16:15 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xb, 0x21, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x35ee3d44, 0x5a, &(0x7f00000018c0)=""/90, 0x40f00, 0x21, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x5, 0x3, 0x726e5b30, 0xfffffffe}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000001980)=[r0, r0, r0, r0], &(0x7f00000019c0)=[{0x3, 0x4, 0x0, 0x850e18ec29db9d30}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x6}, {0x2, 0x1, 0x4, 0x4}], 0x10, 0x7fff}, 0x90) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 632.813965][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 632.828778][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:16:15 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873", 0x19, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 632.882499][T19238] 8021q: adding VLAN 0 to HW filter on device batadv0 17:16:15 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 632.972847][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 632.981948][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 633.023257][T19242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 633.049698][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 633.084809][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 633.093822][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 17:16:15 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)=@generic={0x0}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 633.135525][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 633.151442][T19239] 8021q: adding VLAN 0 to HW filter on device bond0 [ 633.184424][T15791] Bluetooth: hci2: command 0x0419 tx timeout [ 633.193463][T19242] 8021q: adding VLAN 0 to HW filter on device team0 [ 633.216243][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 633.224089][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:16:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 633.247475][T19238] device veth0_vlan entered promiscuous mode [ 633.254837][T15791] Bluetooth: hci3: command 0x0419 tx timeout [ 633.312811][T19239] 8021q: adding VLAN 0 to HW filter on device team0 [ 633.328934][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 633.339401][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 633.344324][T15791] Bluetooth: hci4: command 0x0419 tx timeout [ 633.355970][T17759] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.363024][T17759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.395509][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 17:16:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 633.412786][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 633.430903][T17759] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.438031][T17759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.467902][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 633.481442][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 633.493155][T17759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:16:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) 17:16:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) 17:16:16 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff", 0x14, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:16 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873", 0x19, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 633.766328][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 633.776669][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 633.805194][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 633.835178][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 633.854752][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 633.863475][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 633.884681][ T3519] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.891752][ T3519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.904577][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 633.924682][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 633.933926][ T3519] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.941052][ T3519] bridge0: port 2(bridge_slave_1) entered forwarding state 17:16:16 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873", 0x19, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 633.988092][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 633.996141][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 634.004040][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 634.029932][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 634.045003][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 634.053446][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 634.083272][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 634.105174][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 634.124954][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 634.133841][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 634.159749][T19242] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 634.183219][T19242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 634.204791][T19238] device veth1_vlan entered promiscuous mode [ 634.212038][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 634.229657][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 634.247397][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 634.283625][T19239] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 634.318306][T19239] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 634.384502][T19238] device veth0_macvtap entered promiscuous mode [ 634.419219][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 17:16:17 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 634.435137][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 634.443601][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 634.475276][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 634.500646][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 634.516070][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 634.530534][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 634.544894][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 634.559527][T19238] device veth1_macvtap entered promiscuous mode [ 634.574797][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 634.582524][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 17:16:17 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873", 0x19, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 634.618459][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 634.655306][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 634.677478][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.714468][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 634.745353][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.784214][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 634.804165][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.814001][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 634.834158][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.843984][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 634.874214][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.884053][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 634.924297][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.934278][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 634.974168][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.001140][T19238] batman_adv: batadv0: Interface activated: batadv_slave_0 17:16:17 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c5", 0x1b, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 635.034286][T19242] 8021q: adding VLAN 0 to HW filter on device batadv0 17:16:17 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873", 0x19, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 635.752995][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 635.762110][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 635.790424][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 635.811019][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 635.829058][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 635.856098][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.904170][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 635.926402][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.944397][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 635.965364][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.984397][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 636.005091][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 636.024303][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 636.046228][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 636.065932][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 636.084365][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 636.104216][T19238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 636.125568][T19238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:16:18 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 636.161314][T19238] batman_adv: batadv0: Interface activated: batadv_slave_1 17:16:18 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c5", 0x1b, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 636.209116][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 636.224929][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 636.275639][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 636.283163][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 636.326970][T19238] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 636.341254][T19238] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 636.350329][T19238] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 636.380082][T19238] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 636.398650][T19239] 8021q: adding VLAN 0 to HW filter on device batadv0 17:16:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x6, 0x80005, 0x4000007, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x80800, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000100)={'xfrm0\x00', @multicast}) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000180)=0x1) 17:16:19 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c5", 0x1b, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 636.941576][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 636.965000][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 636.994232][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 637.002924][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 637.031310][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 637.051762][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.064431][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.072286][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.088591][T19239] device veth0_vlan entered promiscuous mode [ 637.107180][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 637.132656][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.168375][T19242] device veth0_vlan entered promiscuous mode [ 637.193097][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.204856][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.224348][ T394] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 637.227156][T19239] device veth1_vlan entered promiscuous mode [ 637.232356][ T394] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 637.275929][T19242] device veth1_vlan entered promiscuous mode [ 637.292800][ T394] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 637.316031][ T394] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 637.323400][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 637.336881][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 637.354878][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 637.377082][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 637.400616][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:16:20 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xba, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.events.local\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x13, 0x0, 0x10001, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=r1, r2, 0x2d, 0x0, r3, @link_fd=r4, r5}, 0x20) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) ioctl$TUNGETFILTER(r6, 0x801054db, &(0x7f0000000200)=""/162) [ 637.442607][T19239] device veth0_macvtap entered promiscuous mode 17:16:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x6, 0x80005, 0x4000007, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x80800, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000100)={'xfrm0\x00', @multicast}) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000180)=0x1) [ 637.494866][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 637.503301][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 637.521971][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 637.546524][T19239] device veth1_macvtap entered promiscuous mode [ 637.562131][T19242] device veth0_macvtap entered promiscuous mode 17:16:20 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596", 0x1c, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 637.591052][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 637.610640][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 637.623384][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 637.643686][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 637.661548][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 637.687889][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 637.724363][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 637.744204][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 637.757361][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 637.779309][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 637.802227][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 637.824762][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 637.844512][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 637.864480][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 637.885701][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 637.915965][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 637.936769][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 637.954433][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 637.974756][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 637.985760][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 637.997535][T19239] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 638.008518][T19242] device veth1_macvtap entered promiscuous mode [ 638.016956][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 638.025425][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 638.033433][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 638.056453][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 17:16:21 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xba, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.events.local\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x13, 0x0, 0x10001, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=r1, r2, 0x2d, 0x0, r3, @link_fd=r4, r5}, 0x20) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) ioctl$TUNGETFILTER(r6, 0x801054db, &(0x7f0000000200)=""/162) 17:16:21 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596", 0x1c, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 638.486888][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 638.510989][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 638.537815][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 638.562808][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 638.588315][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 638.612148][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 638.638017][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 638.663012][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 638.686515][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 638.716981][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 638.744261][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 638.768125][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 638.790662][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 638.813126][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 638.833184][T19239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 638.858608][T19239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 638.882111][T19239] batman_adv: batadv0: Interface activated: batadv_slave_1 17:16:21 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596", 0x1c, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 638.916796][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 638.927642][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 638.940672][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 638.957980][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 638.968627][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 638.980717][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 638.990878][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 639.024751][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.041356][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 639.063065][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.085058][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 639.108853][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.129851][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 639.151407][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.172527][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 17:16:21 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xba, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.events.local\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x13, 0x0, 0x10001, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=r1, r2, 0x2d, 0x0, r3, @link_fd=r4, r5}, 0x20) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) [ 639.195476][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.224326][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 639.244243][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.254077][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 639.304509][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.335881][T19242] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 639.345974][T19239] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 639.368387][T19239] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 639.386089][T19239] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 639.406788][T19239] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 17:16:22 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x6, 0x80005, 0x4000007, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x80800, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000100)={'xfrm0\x00', @multicast}) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000180)=0x1) [ 639.432617][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 639.444868][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 639.465625][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 639.484007][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.506976][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 639.535432][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.564753][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 639.595357][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.627794][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 639.657166][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.682652][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 639.709256][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.725986][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 639.743648][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.767053][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 639.787601][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.800854][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 639.814224][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.827508][T19242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 639.846623][T19242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 639.866958][T19242] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 639.948038][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 639.963547][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:16:22 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 639.993189][T19242] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 640.013776][T19242] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 640.038911][T19242] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 640.065541][T19242] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 17:16:22 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xba, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.events.local\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x13, 0x0, 0x10001, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:22 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socketpair(0x6, 0x80005, 0x4000007, &(0x7f0000000040)) 17:16:23 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair(0x6, 0x80005, 0x4000007, &(0x7f0000000040)) [ 640.450316][ T5462] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 640.470734][ T5462] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 640.564507][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 640.730600][T15397] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 640.743412][T15397] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:16:23 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xba, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.events.local\x00', 0x0, 0x0) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:23 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x10, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:23 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 641.133163][T13979] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 641.162499][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 641.162615][T13979] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:16:23 executing program 0: socketpair(0x6, 0x80005, 0x4000007, &(0x7f0000000040)) [ 641.256384][ T5462] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 641.270965][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 641.296093][ T5462] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:16:24 executing program 4: socketpair(0x0, 0x3, 0x3, &(0x7f0000000040)) [ 641.334496][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:16:24 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x10, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:24 executing program 4: socketpair(0x0, 0x3, 0x3, &(0x7f0000000040)) 17:16:24 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:24 executing program 4: socketpair(0x0, 0x3, 0x3, &(0x7f0000000040)) 17:16:24 executing program 0: socketpair(0x0, 0x80005, 0x4000007, &(0x7f0000000040)) 17:16:24 executing program 4: socketpair(0xa, 0x0, 0x3, &(0x7f0000000040)) 17:16:24 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xba, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x4) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:24 executing program 0: socketpair(0x0, 0x80005, 0x4000007, &(0x7f0000000040)) 17:16:24 executing program 4: socketpair(0xa, 0x0, 0x3, &(0x7f0000000040)) 17:16:25 executing program 4: socketpair(0xa, 0x0, 0x3, &(0x7f0000000040)) 17:16:25 executing program 0: socketpair(0x0, 0x80005, 0x4000007, &(0x7f0000000040)) 17:16:25 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000040)) 17:16:25 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000040)) 17:16:25 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:25 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:25 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000040)) 17:16:25 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xba, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:25 executing program 0: socketpair(0x6, 0x0, 0x4000007, &(0x7f0000000040)) 17:16:25 executing program 4: socketpair(0xa, 0x3, 0x3, 0x0) 17:16:25 executing program 4: socketpair(0xa, 0x3, 0x3, 0x0) 17:16:26 executing program 4: socketpair(0xa, 0x3, 0x3, 0x0) 17:16:26 executing program 0: socketpair(0x6, 0x0, 0x0, &(0x7f0000000040)) 17:16:26 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000040)) 17:16:26 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000040)) 17:16:26 executing program 0: socketpair(0x6, 0x0, 0x0, 0x0) 17:16:26 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xba, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:26 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000040)) 17:16:26 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000000040)) 17:16:26 executing program 0: socketpair(0x6, 0x0, 0x0, 0x0) 17:16:26 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:26 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:26 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000000040)) 17:16:27 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000000040)) 17:16:27 executing program 0: socketpair(0x6, 0x0, 0x0, 0x0) 17:16:27 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000040)) 17:16:27 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:27 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:27 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000040)) 17:16:27 executing program 0: socketpair(0x0, 0x3, 0x0, &(0x7f0000000040)) 17:16:27 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:27 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000040)) 17:16:27 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:27 executing program 4: socketpair(0xa, 0x3, 0x0, 0x0) 17:16:28 executing program 4: socketpair(0xa, 0x3, 0x0, 0x0) 17:16:28 executing program 4: socketpair(0xa, 0x3, 0x0, 0x0) 17:16:28 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:28 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:28 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:28 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:28 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:28 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x10, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:28 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x10, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:28 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:29 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x10, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:29 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:29 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:29 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:29 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:29 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:31 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:31 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:31 executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) 17:16:31 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:32 executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) 17:16:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:32 executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) 17:16:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 17:16:32 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xf, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:33 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:33 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x40000000) 17:16:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 17:16:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) [ 650.853107][ T144] device hsr_slave_0 left promiscuous mode [ 651.004487][ T144] device hsr_slave_1 left promiscuous mode 17:16:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) [ 651.169192][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 651.183871][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 17:16:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) [ 651.301897][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 651.318391][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 17:16:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 17:16:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) [ 651.459007][ T144] device bridge_slave_1 left promiscuous mode [ 651.465268][ T144] bridge0: port 2(bridge_slave_1) entered disabled state 17:16:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) [ 651.706400][ T144] device bridge_slave_0 left promiscuous mode [ 651.714653][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 17:16:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) 17:16:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 17:16:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) [ 652.124059][ T144] device hsr_slave_0 left promiscuous mode [ 652.233860][ T144] device hsr_slave_1 left promiscuous mode 17:16:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) [ 652.325768][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 652.348797][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 17:16:35 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) [ 652.591203][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 17:16:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) [ 652.634264][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 17:16:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) 17:16:35 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:16:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:16:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) [ 653.859723][ T144] device bridge_slave_1 left promiscuous mode [ 653.866187][ T144] bridge0: port 2(bridge_slave_1) entered disabled state 17:16:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) [ 653.999405][ T144] device bridge_slave_0 left promiscuous mode [ 654.008010][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.127449][ T144] device hsr_slave_0 left promiscuous mode [ 654.157018][ T144] device hsr_slave_1 left promiscuous mode 17:16:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x40000000) [ 654.205068][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 654.216549][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 654.247346][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 654.304283][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 654.452887][ T144] device bridge_slave_1 left promiscuous mode [ 654.461230][ T144] bridge0: port 2(bridge_slave_1) entered disabled state 17:16:37 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 654.873902][ T144] device bridge_slave_0 left promiscuous mode [ 654.880362][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 17:16:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) [ 655.515983][ T144] device hsr_slave_0 left promiscuous mode [ 655.643495][ T144] device hsr_slave_1 left promiscuous mode [ 655.757487][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 655.770671][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 655.864596][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 655.872050][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 656.013668][ T144] device bridge_slave_1 left promiscuous mode [ 656.020096][ T144] bridge0: port 2(bridge_slave_1) entered disabled state 17:16:38 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 656.474799][ T144] device bridge_slave_0 left promiscuous mode [ 656.481015][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.565308][ T144] device hsr_slave_0 left promiscuous mode [ 656.815673][ T144] device hsr_slave_1 left promiscuous mode [ 658.016294][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 658.023808][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 658.715646][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 658.723094][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 659.286975][ T144] device bridge_slave_1 left promiscuous mode [ 659.293181][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 659.339489][ T144] device bridge_slave_0 left promiscuous mode [ 659.356197][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.474472][ T144] device veth1_macvtap left promiscuous mode [ 662.480537][ T144] device veth0_macvtap left promiscuous mode [ 662.514423][ T144] device veth1_vlan left promiscuous mode [ 662.520237][ T144] device veth0_vlan left promiscuous mode [ 664.355069][ T144] device veth1_macvtap left promiscuous mode [ 664.367990][ T144] device veth0_macvtap left promiscuous mode [ 664.374063][ T144] device veth1_vlan left promiscuous mode [ 664.397586][ T144] device veth0_vlan left promiscuous mode [ 664.414629][ T144] device veth1_macvtap left promiscuous mode [ 664.420658][ T144] device veth0_macvtap left promiscuous mode [ 664.426921][ T144] device veth1_vlan left promiscuous mode [ 664.432704][ T144] device veth0_vlan left promiscuous mode [ 664.440379][ T144] device veth1_macvtap left promiscuous mode [ 664.446749][ T144] device veth0_macvtap left promiscuous mode [ 664.452794][ T144] device veth1_vlan left promiscuous mode [ 664.460090][ T144] device veth0_vlan left promiscuous mode [ 666.279748][ T144] device veth1_macvtap left promiscuous mode [ 666.311764][ T144] device veth0_macvtap left promiscuous mode [ 666.349845][ T144] device veth1_vlan left promiscuous mode [ 666.355693][ T144] device veth0_vlan left promiscuous mode 17:17:02 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xf, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:17:05 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:17:05 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 683.573362][ T144] team0 (unregistering): Port device team_slave_1 removed [ 683.984244][T15784] Bluetooth: hci5: command 0x0409 tx timeout [ 684.001951][ T144] team0 (unregistering): Port device team_slave_0 removed [ 684.049835][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 684.113044][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 17:17:07 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 685.585912][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.592738][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 686.054472][ T13] Bluetooth: hci6: command 0x0409 tx timeout [ 686.060938][ T13] Bluetooth: hci5: command 0x041b tx timeout 17:17:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) [ 686.703825][ T144] bond0 (unregistering): Released all slaves [ 686.945168][T15784] Bluetooth: hci7: command 0x0409 tx timeout [ 688.134621][ T3558] Bluetooth: hci5: command 0x040f tx timeout [ 688.140974][ T3558] Bluetooth: hci6: command 0x041b tx timeout [ 688.534204][T17759] Bluetooth: hci8: command 0x0409 tx timeout [ 689.014259][ T3558] Bluetooth: hci7: command 0x041b tx timeout [ 689.936749][ T144] team0 (unregistering): Port device team_slave_1 removed [ 690.214229][ T3558] Bluetooth: hci6: command 0x040f tx timeout [ 690.224469][ T3558] Bluetooth: hci5: command 0x0419 tx timeout [ 690.334886][ T144] team0 (unregistering): Port device team_slave_0 removed [ 690.598954][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 690.614261][T17759] Bluetooth: hci8: command 0x041b tx timeout [ 690.935724][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 691.094207][ T3558] Bluetooth: hci7: command 0x040f tx timeout [ 691.254224][ T13] Bluetooth: hci9: command 0x0409 tx timeout [ 692.294315][ T13] Bluetooth: hci6: command 0x0419 tx timeout [ 692.694247][ T13] Bluetooth: hci8: command 0x040f tx timeout [ 693.074942][ T144] bond0 (unregistering): Released all slaves [ 693.174181][T17759] Bluetooth: hci7: command 0x0419 tx timeout [ 693.334232][ T13] Bluetooth: hci9: command 0x041b tx timeout [ 694.774232][T17759] Bluetooth: hci8: command 0x0419 tx timeout [ 695.414178][T17759] Bluetooth: hci9: command 0x040f tx timeout [ 697.494168][ T3558] Bluetooth: hci9: command 0x0419 tx timeout [ 698.210176][ T144] team0 (unregistering): Port device team_slave_1 removed [ 698.895486][ T144] team0 (unregistering): Port device team_slave_0 removed [ 699.746214][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 700.361656][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 703.140945][ T144] bond0 (unregistering): Released all slaves [ 707.588909][ T144] team0 (unregistering): Port device team_slave_1 removed [ 708.127564][ T144] team0 (unregistering): Port device team_slave_0 removed [ 708.462085][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 709.000558][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 712.609396][ T144] bond0 (unregistering): Released all slaves [ 718.389028][ T144] team0 (unregistering): Port device team_slave_1 removed [ 719.049616][ T144] team0 (unregistering): Port device team_slave_0 removed [ 719.429523][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 720.249314][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 722.676628][ T144] bond0 (unregistering): Released all slaves [ 723.609659][T19879] chnl_net:caif_netlink_parms(): no params data found [ 723.636505][T19876] chnl_net:caif_netlink_parms(): no params data found [ 723.659390][T19870] chnl_net:caif_netlink_parms(): no params data found [ 723.683361][T19885] chnl_net:caif_netlink_parms(): no params data found [ 724.059999][T19882] chnl_net:caif_netlink_parms(): no params data found [ 730.338135][T19879] bridge0: port 1(bridge_slave_0) entered blocking state [ 730.352209][T19879] bridge0: port 1(bridge_slave_0) entered disabled state [ 730.375225][T19879] device bridge_slave_0 entered promiscuous mode [ 731.426075][T19879] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.433160][T19879] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.475260][T19879] device bridge_slave_1 entered promiscuous mode [ 731.549668][T19870] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.614136][T19870] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.622247][T19870] device bridge_slave_0 entered promiscuous mode [ 731.704607][T19876] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.711692][T19876] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.754286][T19876] device bridge_slave_0 entered promiscuous mode [ 731.762011][T19885] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.772892][T19885] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.805924][T19885] device bridge_slave_0 entered promiscuous mode [ 732.931762][T19870] bridge0: port 2(bridge_slave_1) entered blocking state [ 732.944188][T19870] bridge0: port 2(bridge_slave_1) entered disabled state [ 732.965190][T19870] device bridge_slave_1 entered promiscuous mode [ 732.994807][T19876] bridge0: port 2(bridge_slave_1) entered blocking state [ 733.002525][T19876] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.045162][T19876] device bridge_slave_1 entered promiscuous mode [ 733.065159][T19885] bridge0: port 2(bridge_slave_1) entered blocking state [ 733.072226][T19885] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.101132][T19885] device bridge_slave_1 entered promiscuous mode [ 733.133739][T19879] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 733.143382][T19882] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.151261][T19882] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.175327][T19882] device bridge_slave_0 entered promiscuous mode [ 734.703239][T19879] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 734.746531][T19882] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.753614][T19882] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.785201][T19882] device bridge_slave_1 entered promiscuous mode [ 735.059092][T19876] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 735.126280][T19885] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 735.418084][T19870] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 735.460196][T19876] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 735.498201][T19885] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 736.031586][T19879] team0: Port device team_slave_0 added [ 736.236248][T19870] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 737.085388][T19885] team0: Port device team_slave_0 added [ 737.092704][T19879] team0: Port device team_slave_1 added [ 737.639163][T19882] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 738.517891][T19876] team0: Port device team_slave_0 added [ 738.971751][T19885] team0: Port device team_slave_1 added [ 738.981195][T19882] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 739.016502][T19870] team0: Port device team_slave_0 added [ 739.023562][T19876] team0: Port device team_slave_1 added [ 741.457024][T19870] team0: Port device team_slave_1 added [ 741.463262][T19879] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 741.484511][T19879] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 741.551168][T19879] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 741.587365][T19885] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 741.597684][T19885] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 741.689854][T19885] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 741.727797][T19882] team0: Port device team_slave_0 added [ 741.740765][T19876] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 741.754178][T19876] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 741.814250][T19876] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 742.031362][T19879] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 742.044110][T19879] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 742.121129][T19879] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 742.149681][T19885] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 742.158480][T19885] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 742.254131][T19885] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 742.306273][T19882] team0: Port device team_slave_1 added [ 742.312522][T19876] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 742.321049][T19876] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 742.389807][T19876] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 742.817827][T19882] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 742.828598][T19882] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 742.904206][T19882] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 743.945588][T19885] device hsr_slave_0 entered promiscuous mode [ 744.049693][T19885] device hsr_slave_1 entered promiscuous mode [ 744.285016][T19882] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 744.291982][T19882] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 744.405560][T19882] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 744.561929][T19879] device hsr_slave_0 entered promiscuous mode [ 744.688929][T19879] device hsr_slave_1 entered promiscuous mode [ 744.816777][T19879] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 744.831393][T19879] Cannot create hsr debugfs directory [ 747.017122][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.023429][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 747.744280][ T3534] Bluetooth: hci0: command 0x0409 tx timeout [ 748.395107][T19885] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 748.797281][T19918] chnl_net:caif_netlink_parms(): no params data found [ 749.094334][T17761] Bluetooth: hci3: command 0x0406 tx timeout [ 749.814182][T17761] Bluetooth: hci0: command 0x041b tx timeout [ 749.826812][T19885] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.965319][T19922] chnl_net:caif_netlink_parms(): no params data found [ 750.374322][T17761] Bluetooth: hci1: command 0x0409 tx timeout [ 750.784583][T15795] Bluetooth: hci2: command 0x0409 tx timeout [ 751.055669][T19885] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 751.155088][T19918] bridge0: port 1(bridge_slave_0) entered blocking state [ 751.162170][T19918] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.205257][T19918] device bridge_slave_0 entered promiscuous mode [ 751.437028][T19918] bridge0: port 2(bridge_slave_1) entered blocking state [ 751.454195][T19918] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.462378][T19918] device bridge_slave_1 entered promiscuous mode [ 751.724700][T19885] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 751.894284][T17759] Bluetooth: hci4: command 0x0409 tx timeout [ 751.900329][T17759] Bluetooth: hci0: command 0x040f tx timeout [ 752.464268][T15795] Bluetooth: hci1: command 0x041b tx timeout [ 752.582489][T19922] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.592142][T19922] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.624283][T19922] device bridge_slave_0 entered promiscuous mode [ 752.679546][T19918] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 752.714322][T19922] bridge0: port 2(bridge_slave_1) entered blocking state [ 752.721401][T19922] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.747621][T19922] device bridge_slave_1 entered promiscuous mode [ 752.817755][T19918] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 752.854334][ T3534] Bluetooth: hci2: command 0x041b tx timeout [ 753.417368][T19922] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 753.974283][ T3534] Bluetooth: hci0: command 0x0419 tx timeout [ 753.980391][ T3534] Bluetooth: hci4: command 0x041b tx timeout [ 754.137496][T19922] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 754.157216][T19925] chnl_net:caif_netlink_parms(): no params data found [ 754.182545][T19918] team0: Port device team_slave_0 added [ 754.535160][T15795] Bluetooth: hci1: command 0x040f tx timeout [ 754.693284][T19918] team0: Port device team_slave_1 added [ 754.717302][T19922] team0: Port device team_slave_0 added [ 754.944267][T15789] Bluetooth: hci2: command 0x040f tx timeout [ 755.236980][T19922] team0: Port device team_slave_1 added [ 755.300112][T19918] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 755.324313][T19918] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 755.463942][T19918] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 755.817524][T19918] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 755.824771][T19918] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 755.932929][T19918] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 755.955275][T19922] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 755.962228][T19922] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 756.055350][T19922] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 756.066294][T15795] Bluetooth: hci4: command 0x040f tx timeout [ 756.139585][T19922] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 756.152082][T19922] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 756.264113][T19922] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 756.556482][T19925] bridge0: port 1(bridge_slave_0) entered blocking state [ 756.563566][T19925] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.586761][T19925] device bridge_slave_0 entered promiscuous mode [ 756.614400][T15795] Bluetooth: hci1: command 0x0419 tx timeout [ 756.627447][T19925] bridge0: port 2(bridge_slave_1) entered blocking state [ 756.648507][T19925] bridge0: port 2(bridge_slave_1) entered disabled state [ 756.685835][T19925] device bridge_slave_1 entered promiscuous mode [ 757.014334][T15789] Bluetooth: hci2: command 0x0419 tx timeout [ 757.094409][T15789] Bluetooth: hci5: command 0x0409 tx timeout [ 757.450799][T19933] chnl_net:caif_netlink_parms(): no params data found [ 757.495498][T19925] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 757.607236][T19918] device hsr_slave_0 entered promiscuous mode [ 757.658368][T19918] device hsr_slave_1 entered promiscuous mode [ 757.715304][T19918] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 757.722896][T19918] Cannot create hsr debugfs directory [ 757.909589][T19922] device hsr_slave_0 entered promiscuous mode [ 757.916948][T19922] device hsr_slave_1 entered promiscuous mode [ 757.927562][T19922] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 757.944190][T19922] Cannot create hsr debugfs directory [ 757.958929][T19925] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 758.134227][T17761] Bluetooth: hci4: command 0x0419 tx timeout [ 758.754278][T19925] team0: Port device team_slave_0 added [ 759.150853][T19925] team0: Port device team_slave_1 added [ 759.174752][T17759] Bluetooth: hci5: command 0x041b tx timeout [ 759.755201][T19933] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.762273][T19933] bridge0: port 1(bridge_slave_0) entered disabled state [ 759.775191][T19933] device bridge_slave_0 entered promiscuous mode [ 759.965719][T19925] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 759.972777][T19925] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 760.044630][T19925] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 760.060382][T19933] bridge0: port 2(bridge_slave_1) entered blocking state [ 760.068625][T19933] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.085223][T19933] device bridge_slave_1 entered promiscuous mode [ 760.311050][T19925] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 760.320438][T19925] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 760.391581][T19925] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 760.742335][T19933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 761.224742][T19933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 761.249176][T19925] device hsr_slave_0 entered promiscuous mode [ 761.254343][T17761] Bluetooth: hci5: command 0x040f tx timeout [ 761.284607][T19925] device hsr_slave_1 entered promiscuous mode [ 761.344214][T19925] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 761.351790][T19925] Cannot create hsr debugfs directory [ 761.604843][T19918] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.227353][T19933] team0: Port device team_slave_0 added [ 762.585189][T19918] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.699184][T19933] team0: Port device team_slave_1 added [ 762.782154][T19933] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 762.800188][T19933] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 762.874097][T19933] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 762.898621][T19933] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 762.914561][T19933] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 762.953617][T19933] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 763.255080][T19918] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 763.321706][T19945] chnl_net:caif_netlink_parms(): no params data found [ 763.334291][ T13] Bluetooth: hci5: command 0x0419 tx timeout [ 763.468389][T19933] device hsr_slave_0 entered promiscuous mode [ 763.494835][T19933] device hsr_slave_1 entered promiscuous mode [ 763.512705][T19933] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 763.544110][T19933] Cannot create hsr debugfs directory [ 763.781076][T19918] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 764.649074][T19945] bridge0: port 1(bridge_slave_0) entered blocking state [ 764.664814][T19945] bridge0: port 1(bridge_slave_0) entered disabled state [ 764.685044][T19945] device bridge_slave_0 entered promiscuous mode [ 764.735853][T19945] bridge0: port 2(bridge_slave_1) entered blocking state [ 764.742920][T19945] bridge0: port 2(bridge_slave_1) entered disabled state [ 764.785493][T19945] device bridge_slave_1 entered promiscuous mode [ 765.317337][T19918] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 765.339014][T19945] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 765.444797][ T144] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 765.606182][T19922] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 765.638649][T19918] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 765.707526][T19945] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 765.840969][T19918] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 765.862248][T19922] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.247268][ T144] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.295044][T19918] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 766.416619][T19922] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.508138][T19945] team0: Port device team_slave_0 added [ 766.615874][ T144] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.651983][T19945] team0: Port device team_slave_1 added [ 766.688845][T19922] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.970543][T19945] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 766.984172][T19945] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 767.064183][T19945] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 767.176490][ T144] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 767.238620][T19945] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 767.264818][T19945] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 767.328454][T19945] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 767.616980][T19945] device hsr_slave_0 entered promiscuous mode [ 767.638961][T19945] device hsr_slave_1 entered promiscuous mode [ 767.685313][T19945] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 767.692911][T19945] Cannot create hsr debugfs directory [ 767.921293][T19918] 8021q: adding VLAN 0 to HW filter on device bond0 [ 768.031165][T19918] 8021q: adding VLAN 0 to HW filter on device team0 [ 768.077387][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 768.094721][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 768.194657][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 768.203313][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 768.234527][T15795] bridge0: port 1(bridge_slave_0) entered blocking state [ 768.241596][T15795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 768.444812][ T144] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 768.589280][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 768.614876][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 768.644547][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 768.659272][ T3534] bridge0: port 2(bridge_slave_1) entered blocking state [ 768.666441][ T3534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 768.724474][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 768.806156][ T144] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 768.875559][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 768.919564][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 768.929065][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 768.954790][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 768.963525][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 768.984821][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 768.993144][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 769.024718][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 769.033084][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 769.055015][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 769.284770][ T144] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 769.436403][ T144] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 769.566958][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 769.585753][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 769.615861][T19918] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 769.696647][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 769.705724][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 769.777794][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 769.797461][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 769.837555][T19918] device veth0_vlan entered promiscuous mode [ 769.846901][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 769.864898][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 769.877728][T19918] device veth1_vlan entered promiscuous mode [ 770.023790][T19918] device veth0_macvtap entered promiscuous mode [ 770.039580][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 770.054627][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 770.084770][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 770.114592][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 770.305149][T19922] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 770.346717][T19918] device veth1_macvtap entered promiscuous mode [ 770.366384][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 770.375306][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 770.388625][T19922] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 770.409769][T19922] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 770.436711][T19922] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 770.607970][T19918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 770.634730][T19918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 770.674100][T19918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 770.704576][T19918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 770.723420][T19918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 770.741532][T19918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 770.764759][T19918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 770.793370][T19918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 770.814104][T19918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 770.864123][T19918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 770.905557][T19918] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 771.174470][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 771.183180][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 771.225730][T19918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 771.243725][T19918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.261713][T19918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 771.287740][T19918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.305316][T19918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 771.334088][T19918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.346412][T19918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 771.357160][T19918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.376058][T19918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 771.413845][T19918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.432170][T19918] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 771.544297][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 771.575255][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 771.596709][T19918] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 771.616254][T19918] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 771.630765][T19918] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 771.664121][T19918] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 771.736286][T19922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 771.852799][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 771.867968][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 772.716279][T19922] 8021q: adding VLAN 0 to HW filter on device team0 [ 772.754241][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 772.762857][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 772.804736][T17762] bridge0: port 1(bridge_slave_0) entered blocking state [ 772.811812][T17762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 772.854699][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 772.863369][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 772.894512][T17762] bridge0: port 2(bridge_slave_1) entered blocking state [ 772.901570][T17762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 772.929667][T20001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 772.955360][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 772.964006][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 772.994936][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 773.003609][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 773.101466][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 773.115824][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 773.125187][ T1452] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 773.133163][ T1452] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 773.144842][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 773.179786][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 773.187680][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 773.209507][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 773.238633][T19922] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 773.264907][T19922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 773.279542][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 773.287635][ T394] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 773.305883][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 773.313873][ T394] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:18:36 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xf, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 773.622145][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 773.847830][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 773.861008][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 773.891426][T19922] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 773.954523][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 773.964043][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 774.016141][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 774.024954][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 774.049737][T19922] device veth0_vlan entered promiscuous mode [ 774.059364][T20001] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 17:18:36 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xf, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 774.069198][T20001] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 774.107091][T19922] device veth1_vlan entered promiscuous mode [ 774.157731][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 774.193109][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 774.215136][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 774.223715][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 774.256383][T19922] device veth0_macvtap entered promiscuous mode [ 774.282607][T19922] device veth1_macvtap entered promiscuous mode [ 774.338536][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 774.370299][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 774.382163][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 774.400895][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 774.429912][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 774.466476][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 774.496936][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 774.514191][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 774.524012][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 774.565317][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 774.595322][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 774.615545][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 774.635566][T19922] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 774.644043][T19925] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 774.663811][T19925] netdevsim netdevsim4 netdevsim1: renamed from eth1 17:18:37 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 774.709778][T19925] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 774.745343][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 774.766378][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 774.801453][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 774.820081][T15795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 774.856815][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 774.884466][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 774.934888][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 774.954091][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 774.963921][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 775.014391][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 775.035385][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 775.087255][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 775.134095][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 775.164188][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 775.174043][T19922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 775.234138][T19922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 775.255808][T19922] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 775.263176][T19925] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 775.304284][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 775.312898][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:18:38 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 775.350725][T19922] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 775.375214][T19922] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 775.383935][T19922] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 775.414103][T19922] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 775.443784][T19945] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 775.555624][T19945] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 775.726073][T19945] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 775.773933][T19945] netdevsim netdevsim2 netdevsim3: renamed from eth3 17:18:38 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 775.986679][T19933] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 776.022793][T19933] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 776.183668][T19933] netdevsim netdevsim0 netdevsim2: renamed from eth2 17:18:39 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 776.311125][T19933] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 776.546497][ T4209] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 776.584798][ T4209] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 776.595272][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 776.621284][T19925] 8021q: adding VLAN 0 to HW filter on device bond0 [ 776.649126][ T4209] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 776.677350][ T4209] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 776.698783][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 776.715633][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 776.742953][T19925] 8021q: adding VLAN 0 to HW filter on device team0 [ 776.765668][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:18:39 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 776.808124][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 776.824671][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 776.857103][T15791] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.864215][T15791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 776.894777][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 776.934547][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 776.943519][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 776.997806][T15791] bridge0: port 2(bridge_slave_1) entered blocking state [ 777.004915][T15791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 777.041592][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 777.059466][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 17:18:39 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 777.139714][T19925] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 777.197234][T19925] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 17:18:39 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 777.251006][T19945] 8021q: adding VLAN 0 to HW filter on device bond0 [ 777.310891][T19933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 777.364243][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 777.373510][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 777.420220][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 777.455400][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 777.486091][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 777.507970][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 777.536968][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 777.564987][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 777.603725][T19945] 8021q: adding VLAN 0 to HW filter on device team0 [ 777.642453][T19933] 8021q: adding VLAN 0 to HW filter on device team0 [ 777.683098][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 777.704848][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:18:40 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 777.731898][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 777.784824][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 777.806799][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 777.837915][T15784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 777.895493][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 777.914712][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 777.948751][T15789] bridge0: port 1(bridge_slave_0) entered blocking state [ 777.955881][T15789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 778.015179][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 778.064554][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 778.085559][T15789] bridge0: port 2(bridge_slave_1) entered blocking state [ 778.092620][T15789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 778.118568][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 778.154995][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 778.194766][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 778.204610][T15789] bridge0: port 1(bridge_slave_0) entered blocking state [ 778.211678][T15789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 778.259199][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 778.294763][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 778.327657][T15789] bridge0: port 2(bridge_slave_1) entered blocking state [ 778.334746][T15789] bridge0: port 2(bridge_slave_1) entered forwarding state 17:18:41 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 778.414518][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 778.422506][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 778.444783][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 778.454360][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 778.485023][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 778.521170][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 778.546023][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 778.565148][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 778.585150][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 778.615192][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 778.634758][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 778.674636][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 778.682136][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:18:41 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 778.722026][T19925] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 778.758865][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 778.774868][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 778.795382][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 778.824783][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 778.861037][T19945] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 778.884155][T19945] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 778.928536][T19933] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 778.963317][T19933] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 778.995624][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 779.010848][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 779.035053][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 779.074877][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 779.102296][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 779.140371][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 779.172522][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 779.204815][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 779.233391][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 779.287932][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:18:42 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 779.558548][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 779.576118][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 17:18:42 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x8, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 779.640566][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 779.663729][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 779.706744][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 779.714918][ T3247] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 779.756613][T19925] device veth0_vlan entered promiscuous mode [ 779.779202][T19945] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 779.803065][T19933] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 779.843166][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 779.851492][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 779.882818][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 779.898399][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:18:44 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 781.705495][T19925] device veth1_vlan entered promiscuous mode 17:18:44 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x8, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 781.767149][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 781.794924][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 781.815554][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 781.857991][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 781.911440][T19933] device veth0_vlan entered promiscuous mode [ 783.047170][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 783.058699][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 783.072603][T19925] device veth0_macvtap entered promiscuous mode 17:18:45 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x8, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:45 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 784.748792][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 784.756718][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 784.784642][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 784.793259][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 784.835279][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 784.844297][T19933] device veth1_vlan entered promiscuous mode [ 784.914929][T19925] device veth1_macvtap entered promiscuous mode [ 784.947026][T19945] device veth0_vlan entered promiscuous mode [ 784.954202][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 17:18:47 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:47 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b3") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 784.962593][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 785.020988][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 785.072042][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.104094][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 785.124102][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.133933][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 785.175763][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.214090][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 785.225828][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.254091][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 785.284509][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.304123][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 785.330972][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.355875][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 785.384649][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.402339][T19925] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 785.431598][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 785.446848][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.474503][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 785.516605][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.533762][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 785.549265][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.568614][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 785.595091][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.616455][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 785.641952][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.662706][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 785.689794][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.711181][T19925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 785.741824][T19925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 785.765177][T19925] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 785.772594][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 785.784876][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 785.824626][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 785.833305][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 785.861016][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 785.874873][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 785.892289][T19933] device veth0_macvtap entered promiscuous mode 17:18:48 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b3") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 785.936724][T19933] device veth1_macvtap entered promiscuous mode [ 785.974891][T19925] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 17:18:48 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 785.983783][T19925] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 786.044841][T19925] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 786.053572][T19925] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 786.125841][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 786.147123][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 786.174927][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 786.194774][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 786.271050][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 786.313569][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 786.344154][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 786.374076][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 786.383930][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 786.415463][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 786.425643][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 786.462475][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 786.496253][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 786.513593][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 786.530216][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 786.564865][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 786.579967][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 786.594077][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 786.624098][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 786.635227][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 786.648458][T19933] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 786.866572][T19945] device veth1_vlan entered promiscuous mode 17:18:49 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b3") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:49 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 786.914287][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 786.934596][T15791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 786.945741][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 786.984090][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 786.993918][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 787.014088][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.023989][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 787.054089][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.063911][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 787.084115][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.094328][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 787.134087][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.143968][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 787.164105][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.194145][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 787.234081][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.243912][T19933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 787.286340][T19933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.307736][T19933] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 787.321581][T19933] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 787.344113][T19933] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 787.384091][T19933] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 787.392804][T19933] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 787.429495][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 787.445780][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 787.624275][T20001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 787.632914][T20001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 17:18:50 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 787.667793][T19945] device veth0_macvtap entered promiscuous mode 17:18:50 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 788.043911][T19945] device veth1_macvtap entered promiscuous mode [ 788.053554][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 788.063688][T17761] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 788.102024][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 788.125924][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.141744][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 788.204156][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.213999][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 788.264103][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.273937][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 788.324132][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.333961][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 788.369677][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.404168][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 788.426365][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.446386][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 788.485263][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.529244][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 788.544863][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.575230][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 788.604103][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.636545][T19945] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 788.654681][ T1452] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 788.662716][ T1452] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 788.670203][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 17:18:51 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 788.680735][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 788.717762][T17762] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 788.757034][T15397] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 788.774945][T15397] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 788.789190][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 788.807253][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.823395][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 788.836612][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.849436][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 788.862472][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.873906][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 788.906499][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.944110][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 788.964221][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.985260][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 789.006387][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 789.026168][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 789.041443][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 789.066575][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 789.080620][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 789.104109][T19945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 789.119197][T19945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 789.144249][T19945] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 789.151613][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 789.174830][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 789.183491][T17758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:18:51 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 791.446215][T19945] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 791.484121][T19945] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 791.492837][T19945] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 791.523364][T19945] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 791.567776][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 791.614370][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 791.767921][ T394] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 17:18:54 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:54 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 791.810730][ T394] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 792.080254][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 792.095924][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:18:55 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d9") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:55 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:55 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), 0x0, &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:55 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, 0x0, 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:55 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d9") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:55 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:55 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) [ 793.236384][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 793.294222][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 793.374775][T20004] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 793.384203][ T394] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 793.392181][ T394] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:18:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) [ 793.434034][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:18:56 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b3") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:56 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:56 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x8, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:56 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:56 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xf, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1, &(0x7f00000000c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}, 0x40000000) 17:18:56 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x8, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:56 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, 0x0, 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:57 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, 0x0, 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:57 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x8, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:57 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:57 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, 0x0, 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:57 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d9") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:57 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d9") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:57 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:57 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socketpair(0x6, 0x80005, 0x4000007, &(0x7f0000000040)) 17:18:58 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596", 0x1c, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b196785") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:18:58 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socketpair(0x6, 0x80005, 0x4000007, &(0x7f0000000040)) 17:18:58 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003d80)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) socketpair(0x22, 0x800, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x4, 0x0, {0xa, 0x4e23, 0x8, @local, 0x4}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="73c883ebd5c0185d4349a55ecedad015380339e182555058eecb5c81ef3731402646614c9b2173ba5af488ca648555613c64357f2cd622628bdd7efc83f958b4fe6289b4a609e24e73ac094393e8b8847eb2", 0x52}], 0x1, &(0x7f0000000240)=[{0x30, 0x11, 0x800, "405a94c307dc22846e25d0888960150388771af00c9427550f"}, {0x28, 0x10d, 0x9, "24847fcc0a8dad6e57b65b80c605536e405a5980415c783c"}], 0x58}, 0x82) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x60100, 0x0) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f0000000340)) ioctl$TUNSETQUEUE(r2, 0x400454d9, 0x0) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r4}, 0x8) 17:18:58 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socketpair(0x6, 0x80005, 0x4000007, &(0x7f0000000040)) 17:18:58 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, 0x0, 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:00 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003d80)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) socketpair(0x22, 0x800, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x4, 0x0, {0xa, 0x4e23, 0x8, @local, 0x4}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="73c883ebd5c0185d4349a55ecedad015380339e182555058eecb5c81ef3731402646614c9b2173ba5af488ca648555613c64357f2cd622628bdd7efc83f958b4fe6289b4a609e24e73ac094393e8b8847eb2", 0x52}], 0x1, &(0x7f0000000240)=[{0x30, 0x11, 0x800, "405a94c307dc22846e25d0888960150388771af00c9427550f"}, {0x28, 0x10d, 0x9, "24847fcc0a8dad6e57b65b80c605536e405a5980415c783c"}], 0x58}, 0x82) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x60100, 0x0) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f0000000340)) ioctl$TUNSETQUEUE(r2, 0x400454d9, 0x0) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r4}, 0x8) 17:19:01 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) 17:19:01 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:01 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b732") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:01 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:02 executing program 2: socket$kcm(0x29, 0x5, 0x0) 17:19:03 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:03 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b732") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:03 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003d80)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) socketpair(0x22, 0x800, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x4, 0x0, {0xa, 0x4e23, 0x8, @local, 0x4}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="73c883ebd5c0185d4349a55ecedad015380339e182555058eecb5c81ef3731402646614c9b2173ba5af488ca648555613c64357f2cd622628bdd7efc83f958b4fe6289b4a609e24e73ac094393e8b8847eb2", 0x52}], 0x1, &(0x7f0000000240)=[{0x30, 0x11, 0x800, "405a94c307dc22846e25d0888960150388771af00c9427550f"}, {0x28, 0x10d, 0x9, "24847fcc0a8dad6e57b65b80c605536e405a5980415c783c"}], 0x58}, 0x82) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x60100, 0x0) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f0000000340)) ioctl$TUNSETQUEUE(r2, 0x400454d9, 0x0) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r4}, 0x8) 17:19:03 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:03 executing program 2: socket$kcm(0x29, 0x0, 0x0) 17:19:03 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003d80)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) socketpair(0x22, 0x800, 0x2, &(0x7f00000000c0)) 17:19:03 executing program 2: socket$kcm(0x29, 0x0, 0x0) 17:19:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003d80)) socketpair(0x22, 0x800, 0x2, &(0x7f00000000c0)) 17:19:04 executing program 2: socket$kcm(0x29, 0x0, 0x0) 17:19:04 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:04 executing program 0: socketpair(0x22, 0x800, 0x2, &(0x7f00000000c0)) 17:19:04 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:04 executing program 0: socketpair(0x0, 0x800, 0x2, &(0x7f00000000c0)) 17:19:04 executing program 2: socket$kcm(0x29, 0x0, 0x0) 17:19:05 executing program 0: socketpair(0x0, 0x800, 0x2, &(0x7f00000000c0)) 17:19:05 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, 0x0, 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:05 executing program 0: socketpair(0x0, 0x800, 0x2, &(0x7f00000000c0)) 17:19:05 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d6", 0x1d, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d9") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:05 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:06 executing program 0: socketpair(0x22, 0x0, 0x2, &(0x7f00000000c0)) 17:19:06 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:06 executing program 0: socketpair(0x22, 0x0, 0x0, &(0x7f00000000c0)) [ 804.066753][T20490] cgroup: fork rejected by pids controller in /syz1 17:19:06 executing program 0: socketpair(0x22, 0x0, 0x0, &(0x7f00000000c0)) 17:19:07 executing program 0: socketpair(0x22, 0x0, 0x0, &(0x7f00000000c0)) 17:19:07 executing program 0: socketpair(0x22, 0x0, 0x2, 0x0) 17:19:07 executing program 0: socketpair(0x22, 0x0, 0x2, 0x0) 17:19:08 executing program 0: socketpair(0x22, 0x0, 0x2, 0x0) 17:19:08 executing program 0: socketpair(0x22, 0x0, 0x0, &(0x7f00000000c0)) 17:19:08 executing program 1: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:08 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x309) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) syz_clone(0x80200, &(0x7f0000000540)="49b8067666a17f3c7caf5974114bd082db9ac8ff6d4631e873e0c596d69dc351df761d0a14e1", 0x26, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="70e1af3bc4546c72481ef00644365f0bf7a6ff9864fbd22336e1da3eb0fa0d7a5ef1a64a079d9a1c32b3d8d1342145c03593f65b8945e482facabce752e70783bc9bf4a14632586e89ca04c122e38bf595e607258a2b92d32136ffda2ee7c67613fd8ba1a9d90ba69514d2c4948fd3f421bce56c3ba5b2a55057c5d3e57207b60194fdf0a095baa759264d3423cd9433df2e7e5325e9d530904359500169b30f0e767bcff42593160344fc3080fd7b3b9aaefeb4b45371c12d181813f72af8a8c4421f5732d901bc7a65c3b73254f35b19678562") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f00000007c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x11, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb9a}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffeb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7918c987}]}, &(0x7f0000000940)='GPL\x00', 0x1000, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0x493, 0x401}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x90) socketpair(0x23, 0x1, 0xfffffe01, &(0x7f0000000a80)) 17:19:08 executing program 0: socketpair(0x22, 0x0, 0x0, &(0x7f00000000c0)) 17:19:09 executing program 0: socketpair(0x22, 0x0, 0x0, &(0x7f00000000c0)) [ 808.455878][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.462184][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 828.684223][ T144] device hsr_slave_0 left promiscuous mode [ 828.996970][ T144] device hsr_slave_1 left promiscuous mode [ 829.386100][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 829.522580][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 829.688559][ T144] device bridge_slave_1 left promiscuous mode [ 829.714294][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.076792][ T144] device bridge_slave_0 left promiscuous mode [ 830.083013][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.507146][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 830.691083][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 830.756108][ T144] device bridge_slave_1 left promiscuous mode [ 830.762293][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 831.235864][ T144] device bridge_slave_0 left promiscuous mode [ 831.244237][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 831.764170][ T144] device hsr_slave_0 left promiscuous mode [ 832.164272][ T144] device hsr_slave_1 left promiscuous mode [ 832.687107][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 832.708562][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 833.079766][ T144] device bridge_slave_1 left promiscuous mode [ 833.113535][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 833.450933][ T144] device bridge_slave_0 left promiscuous mode [ 833.461522][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 833.866796][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 834.096150][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 834.327400][ T144] device bridge_slave_1 left promiscuous mode [ 834.333746][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.924354][ T144] device bridge_slave_0 left promiscuous mode [ 834.930591][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.226145][ T144] device bridge_slave_1 left promiscuous mode [ 835.232362][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.689303][ T144] device bridge_slave_0 left promiscuous mode [ 835.730644][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.612339][ T144] device hsr_slave_0 left promiscuous mode [ 836.974237][ T144] device hsr_slave_1 left promiscuous mode [ 837.155349][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 837.162837][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 837.392162][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 837.417412][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 837.535848][ T144] device bridge_slave_1 left promiscuous mode [ 837.542159][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 837.664474][ T144] device bridge_slave_0 left promiscuous mode [ 837.670702][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.459579][ T144] device hsr_slave_0 left promiscuous mode [ 838.649874][ T144] device hsr_slave_1 left promiscuous mode [ 839.045472][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 839.052954][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 839.122970][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 839.164180][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 839.245362][ T144] device bridge_slave_1 left promiscuous mode [ 839.251563][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.638501][ T144] device bridge_slave_0 left promiscuous mode [ 839.652742][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 840.784776][ T144] device hsr_slave_0 left promiscuous mode [ 841.069957][ T144] device hsr_slave_1 left promiscuous mode [ 841.324275][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 841.331767][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 841.468369][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 841.490655][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 841.681702][ T144] device bridge_slave_1 left promiscuous mode [ 841.714194][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.016767][ T144] device bridge_slave_0 left promiscuous mode [ 842.022989][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.762677][ T144] device hsr_slave_0 left promiscuous mode [ 842.769309][ T144] device hsr_slave_1 left promiscuous mode [ 842.847172][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 842.875702][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 843.002671][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 843.014517][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 843.118451][ T144] device bridge_slave_1 left promiscuous mode [ 843.159668][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 843.586456][ T144] device bridge_slave_0 left promiscuous mode [ 843.593385][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.240526][ T144] device veth1_macvtap left promiscuous mode [ 844.284118][ T144] device veth0_macvtap left promiscuous mode [ 844.290210][ T144] device veth1_vlan left promiscuous mode [ 844.334338][ T144] device veth0_vlan left promiscuous mode [ 845.294389][ T144] device veth1_macvtap left promiscuous mode [ 845.300448][ T144] device veth0_macvtap left promiscuous mode [ 845.324195][ T144] device veth1_vlan left promiscuous mode [ 845.331206][ T144] device veth0_vlan left promiscuous mode [ 846.639215][ T144] device veth1_macvtap left promiscuous mode [ 846.652174][ T144] device veth0_macvtap left promiscuous mode [ 846.684170][ T144] device veth1_vlan left promiscuous mode [ 846.689980][ T144] device veth0_vlan left promiscuous mode [ 847.701497][ T144] device veth1_macvtap left promiscuous mode [ 847.731460][ T144] device veth0_macvtap left promiscuous mode [ 847.741824][ T144] device veth1_vlan left promiscuous mode [ 847.748078][ T144] device veth0_vlan left promiscuous mode [ 869.899247][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.905615][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 871.676214][ T144] team0 (unregistering): Port device team_slave_1 removed [ 871.974246][T20001] Bluetooth: hci0: command 0x0406 tx timeout [ 871.980298][T20001] Bluetooth: hci2: command 0x0406 tx timeout [ 871.993389][T20001] Bluetooth: hci4: command 0x0406 tx timeout [ 872.005003][ T144] team0 (unregistering): Port device team_slave_0 removed [ 872.047407][T20001] Bluetooth: hci1: command 0x0406 tx timeout [ 872.336177][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 872.754562][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 873.514651][ T144] bond0 (unregistering): Released all slaves [ 874.514987][ T144] team0 (unregistering): Port device team_slave_1 removed [ 874.665887][ T144] team0 (unregistering): Port device team_slave_0 removed [ 874.834493][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 875.289652][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 876.488885][ T144] bond0 (unregistering): Released all slaves [ 877.385543][ T144] team0 (unregistering): Port device team_slave_1 removed [ 877.603679][ T144] team0 (unregistering): Port device team_slave_0 removed [ 877.815297][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 878.094513][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 879.509986][ T144] bond0 (unregistering): Released all slaves [ 880.565222][ T144] team0 (unregistering): Port device team_slave_1 removed [ 880.785035][ T144] team0 (unregistering): Port device team_slave_0 removed [ 881.047214][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 881.385141][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 882.214208][ T3247] Bluetooth: hci5: command 0x0406 tx timeout [ 882.491339][ T144] bond0 (unregistering): Released all slaves [ 882.954452][ T144] team0 (unregistering): Port device team_slave_1 removed [ 883.049811][ T144] team0 (unregistering): Port device team_slave_0 removed [ 883.247791][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 883.514441][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 884.575931][ T144] bond0 (unregistering): Released all slaves [ 886.976418][ T144] team0 (unregistering): Port device team_slave_1 removed [ 887.225593][ T144] team0 (unregistering): Port device team_slave_0 removed [ 887.416345][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 887.635554][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 888.405163][ T144] bond0 (unregistering): Released all slaves [ 891.314873][ T144] team0 (unregistering): Port device team_slave_1 removed [ 891.501621][ T144] team0 (unregistering): Port device team_slave_0 removed [ 891.770743][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 891.994400][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 893.134681][ T144] bond0 (unregistering): Released all slaves [ 895.437043][ T144] team0 (unregistering): Port device team_slave_1 removed [ 895.645781][ T144] team0 (unregistering): Port device team_slave_0 removed [ 895.744403][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 895.975691][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 897.046710][ T144] bond0 (unregistering): Released all slaves [ 899.285127][ T144] team0 (unregistering): Port device team_slave_1 removed [ 899.464876][ T144] team0 (unregistering): Port device team_slave_0 removed [ 899.674688][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 899.942258][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 900.799938][ T144] bond0 (unregistering): Released all slaves [ 922.803302][ T144] device hsr_slave_0 left promiscuous mode [ 922.841036][ T144] device hsr_slave_1 left promiscuous mode [ 922.926806][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 922.954058][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 923.010497][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 923.055528][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 923.106159][ T144] device bridge_slave_1 left promiscuous mode [ 923.112373][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.159237][ T144] device bridge_slave_0 left promiscuous mode [ 923.166664][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.597672][ T144] device veth1_macvtap left promiscuous mode [ 923.614063][ T144] device veth0_macvtap left promiscuous mode [ 923.620143][ T144] device veth1_vlan left promiscuous mode [ 923.654094][ T144] device veth0_vlan left promiscuous mode [ 928.142346][ T144] team0 (unregistering): Port device team_slave_1 removed [ 928.165887][ T144] team0 (unregistering): Port device team_slave_0 removed [ 928.177854][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 928.192357][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 928.976656][ T144] bond0 (unregistering): Released all slaves [ 931.345324][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.352052][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 944.784194][ T27] INFO: task syz-executor.3:19922 blocked for more than 143 seconds. [ 944.792476][ T27] Not tainted 5.15.151-syzkaller #0 [ 944.811495][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 944.838544][ T27] task:syz-executor.3 state:D stack:21080 pid:19922 ppid: 1 flags:0x00004006 [ 944.868123][ T27] Call Trace: [ 944.871442][ T27] [ 944.880275][ T27] __schedule+0x12c4/0x45b0 [ 944.890646][ T27] ? __sched_text_start+0x8/0x8 [ 944.901477][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 944.914827][ T27] ? print_irqtrace_events+0x210/0x210 [ 944.920321][ T27] ? _raw_spin_lock_irq+0xdb/0x110 [ 944.944519][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 944.949764][ T27] schedule+0x11b/0x1f0 [ 944.953935][ T27] rwsem_down_write_slowpath+0xebb/0x15c0 [ 944.971231][ T27] ? clear_nonspinnable+0x60/0x60 [ 945.005485][ T27] ? read_lock_is_recursive+0x10/0x10 [ 945.010903][ T27] ? end_current_label_crit_section+0x147/0x170 [ 945.024039][ T27] down_write+0x164/0x170 [ 945.028398][ T27] ? down_read_killable+0x350/0x350 [ 945.033604][ T27] ? may_delete+0x560/0x700 [ 945.051241][ T27] vfs_unlink+0xe0/0x5f0 [ 945.061006][ T27] do_unlinkat+0x4a3/0x950 [ 945.071341][ T27] ? fsnotify_link_count+0xf0/0xf0 [ 945.095897][ T27] ? strncpy_from_user+0x209/0x370 [ 945.101131][ T27] __x64_sys_unlink+0x45/0x50 [ 945.124033][ T27] do_syscall_64+0x3d/0xb0 [ 945.128659][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 945.134993][ T27] RIP: 0033:0x7fb4f4d59557 [ 945.139415][ T27] RSP: 002b:00007ffd352f4758 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 945.152461][ T27] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb4f4d59557 [ 945.169972][ T27] RDX: 00007ffd352f4780 RSI: 00007ffd352f4810 RDI: 00007ffd352f4810 [ 945.188640][ T27] RBP: 00007ffd352f4810 R08: 0000000000000000 R09: 0000000000000000 [ 945.210357][ T27] R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffd352f58d0 [ 945.234329][ T27] R13: 00007fb4f4da53b9 R14: 00000000000c3175 R15: 000000000000000b [ 945.242343][ T27] [ 945.257770][ T27] INFO: task syz-executor.4:19925 blocked for more than 143 seconds. [ 945.284205][ T27] Not tainted 5.15.151-syzkaller #0 [ 945.290041][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 945.314311][ T27] task:syz-executor.4 state:D stack:21088 pid:19925 ppid: 1 flags:0x00004006 [ 945.323554][ T27] Call Trace: [ 945.343254][ T27] [ 945.350007][ T27] __schedule+0x12c4/0x45b0 [ 945.360027][ T27] ? __sched_text_start+0x8/0x8 [ 945.376117][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 945.382637][ T27] ? print_irqtrace_events+0x210/0x210 [ 945.401665][ T27] ? _raw_spin_lock_irq+0xdb/0x110 [ 945.413029][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 945.435769][ T27] schedule+0x11b/0x1f0 [ 945.439961][ T27] rwsem_down_write_slowpath+0xebb/0x15c0 [ 945.447696][ T27] ? clear_nonspinnable+0x60/0x60 [ 945.452746][ T27] ? read_lock_is_recursive+0x10/0x10 [ 945.458524][ T27] ? end_current_label_crit_section+0x147/0x170 [ 945.474053][ T27] down_write+0x164/0x170 [ 945.478420][ T27] ? down_read_killable+0x350/0x350 [ 945.484470][ T27] ? may_delete+0x560/0x700 [ 945.488999][ T27] vfs_unlink+0xe0/0x5f0 [ 945.493250][ T27] do_unlinkat+0x4a3/0x950 [ 945.509424][ T27] ? fsnotify_link_count+0xf0/0xf0 [ 945.520884][ T27] ? strncpy_from_user+0x209/0x370 [ 945.532312][ T27] __x64_sys_unlink+0x45/0x50 [ 945.555872][ T27] do_syscall_64+0x3d/0xb0 [ 945.560322][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 945.575297][ T27] RIP: 0033:0x7fb256561557 [ 945.579786][ T27] RSP: 002b:00007ffc54a06c08 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 945.603043][ T27] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb256561557 [ 945.620786][ T27] RDX: 00007ffc54a06c30 RSI: 00007ffc54a06cc0 RDI: 00007ffc54a06cc0 [ 945.644309][ T27] RBP: 00007ffc54a06cc0 R08: 0000000000000000 R09: 0000000000000000 [ 945.652323][ T27] R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffc54a07d80 [ 945.677225][ T27] R13: 00007fb2565ad3b9 R14: 00000000000c2f23 R15: 000000000000000b [ 945.693363][ T27] [ 945.700364][ T27] INFO: task syz-executor.1:20147 blocked for more than 144 seconds. [ 945.718208][ T27] Not tainted 5.15.151-syzkaller #0 [ 945.723944][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 945.754350][ T27] task:syz-executor.1 state:D stack:21080 pid:20147 ppid: 19918 flags:0x00004002 [ 945.763592][ T27] Call Trace: [ 945.775337][ T27] [ 945.778299][ T27] __schedule+0x12c4/0x45b0 [ 945.782816][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 945.806123][ T27] ? print_irqtrace_events+0x210/0x210 [ 945.811626][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 945.827237][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 945.834263][ T27] ? __sched_text_start+0x8/0x8 [ 945.839183][ T27] ? __might_sleep+0xc0/0xc0 [ 945.843884][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 945.849849][ T27] schedule+0x11b/0x1f0 [ 945.865223][ T27] wb_wait_for_completion+0x164/0x290 [ 945.870698][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 945.877701][ T27] ? init_wait_entry+0xd0/0xd0 [ 945.882493][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 945.914028][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 945.919446][ T27] ? down_read_trylock+0x24a/0x3b0 [ 945.934805][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 945.940572][ T27] ? ktime_get_coarse_real_ts64+0x36/0x120 [ 945.957668][ T27] ? cpumask_next+0xc3/0xf0 [ 945.962263][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 945.979520][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 946.004207][ T27] ext4_da_write_begin+0x228/0xb60 [ 946.009441][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 946.034098][ T27] ? current_time+0x1af/0x2f0 [ 946.038809][ T27] ? atime_needs_update+0x7b0/0x7b0 [ 946.044370][ T27] generic_perform_write+0x2bf/0x5b0 [ 946.049750][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 946.059949][ T27] ? ext4_write_checks+0x255/0x2c0 [ 946.071455][ T27] ext4_buffered_write_iter+0x227/0x360 [ 946.083766][ T27] ext4_file_write_iter+0x87c/0x1990 [ 946.095987][ T27] ? _raw_spin_unlock+0x24/0x40 [ 946.100855][ T27] ? follow_page_pte+0xad5/0xb60 [ 946.125807][ T27] ? follow_page_mask+0xb59/0x13f0 [ 946.130954][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 946.138949][ T27] ? follow_page+0x130/0x130 [ 946.153885][ T27] ? find_vma+0xd3/0x230 [ 946.158465][ T27] ? check_vma_flags+0x407/0x490 [ 946.163407][ T27] ? iov_iter_kvec+0x4a/0x170 [ 946.174791][ T27] __kernel_write+0x5b1/0xa60 [ 946.179547][ T27] ? vfs_read+0xe10/0xe10 [ 946.183877][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 946.206278][ T27] ? down_read_killable+0x1d2/0x350 [ 946.211513][ T27] __dump_emit+0x264/0x3a0 [ 946.235852][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 946.254036][ T27] ? dump_emit+0x152/0x3f0 [ 946.258494][ T27] dump_user_range+0x91/0x320 [ 946.263185][ T27] elf_core_dump+0x3c7d/0x4570 [ 946.276378][ T27] ? reacquire_held_locks+0x660/0x660 [ 946.291768][ T27] ? load_elf_library+0xa40/0xa40 [ 946.309635][ T27] ? mark_lock+0x98/0x340 [ 946.314613][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 946.319963][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 946.332296][ T27] ? kmem_cache_alloc+0x128/0x280 [ 946.350177][ T27] do_coredump+0x1852/0x31e0 [ 946.369480][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 946.375418][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 946.381015][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 946.394644][ T27] ? get_signal+0x8ac/0x14e0 [ 946.399742][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 946.412467][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 946.429545][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 946.438273][ T27] get_signal+0xc06/0x14e0 [ 946.442724][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 946.457133][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 946.462379][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 946.478350][ T27] ? _raw_spin_unlock+0x40/0x40 [ 946.483256][ T27] ? get_sigframe_size+0x10/0x10 [ 946.491905][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 946.500174][ T27] ? force_sig+0x114/0x1d0 [ 946.517351][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 946.522887][ T27] exit_to_user_mode_loop+0x97/0x130 [ 946.532202][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 946.548177][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 946.553658][ T27] exc_general_protection+0x358/0x4f0 [ 946.574896][ T27] ? vtime_user_enter+0x1eb/0x2d0 [ 946.579953][ T27] ? __context_tracking_enter+0x5f/0x90 [ 946.593166][ T27] asm_exc_general_protection+0x22/0x30 [ 946.599524][ T27] RIP: 0033:0x7f60ad500db1 [ 946.610927][ T27] RSP: 002b:0000000020000560 EFLAGS: 00010217 [ 946.619998][ T27] RAX: 0000000000000000 RBX: 00007f60ad62ef80 RCX: 00007f60ad500da9 [ 946.634201][ T27] RDX: 0000000020000580 RSI: 0000000020000560 RDI: 0000000000080200 [ 946.658308][ T27] RBP: 00007f60ad54d47a R08: 0000000020000600 R09: 0000000020000600 [ 946.672538][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000 [ 946.683839][ T27] R13: 000000000000000b R14: 00007f60ad62ef80 R15: 00007ffcaf8f5118 [ 946.703823][ T27] [ 946.721514][ T27] INFO: task syz-executor.3:20242 blocked for more than 145 seconds. [ 946.732018][ T27] Not tainted 5.15.151-syzkaller #0 [ 946.744211][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 946.752888][ T27] task:syz-executor.3 state:D stack:20760 pid:20242 ppid: 19922 flags:0x00004002 [ 946.768676][ T27] Call Trace: [ 946.772002][ T27] [ 946.778918][ T27] __schedule+0x12c4/0x45b0 [ 946.783453][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 946.806881][ T27] ? print_irqtrace_events+0x210/0x210 [ 946.819605][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 946.829782][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 946.839439][ T27] ? __sched_text_start+0x8/0x8 [ 946.847015][ T27] ? __might_sleep+0xc0/0xc0 [ 946.851633][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 946.862574][ T27] schedule+0x11b/0x1f0 [ 946.878821][ T27] wb_wait_for_completion+0x164/0x290 [ 946.890096][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 946.902680][ T27] ? init_wait_entry+0xd0/0xd0 [ 946.910774][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 946.928810][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 946.940000][ T27] ? down_read_trylock+0x24a/0x3b0 [ 946.947979][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 946.953730][ T27] ? cpumask_next+0xc3/0xf0 [ 946.962050][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 946.969928][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 946.979090][ T27] ext4_da_write_begin+0x228/0xb60 [ 946.987350][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 946.993432][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 947.014182][ T27] ? rcu_is_watching+0x11/0xa0 [ 947.019557][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 947.048979][ T27] generic_perform_write+0x2bf/0x5b0 [ 947.054619][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 947.059929][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 947.074061][ T27] ? ext4_write_checks+0x255/0x2c0 [ 947.090100][ T27] ext4_buffered_write_iter+0x227/0x360 [ 947.109404][ T27] ext4_file_write_iter+0x87c/0x1990 [ 947.115039][ T27] ? _raw_spin_unlock+0x24/0x40 [ 947.129691][ T27] ? follow_page_pte+0xad5/0xb60 [ 947.149692][ T27] ? follow_page_mask+0xb59/0x13f0 [ 947.157550][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 947.162865][ T27] ? follow_page+0x130/0x130 [ 947.191798][ T27] ? find_vma+0xd3/0x230 [ 947.196440][ T27] ? check_vma_flags+0x407/0x490 [ 947.201393][ T27] ? iov_iter_kvec+0x4a/0x170 [ 947.212634][ T27] __kernel_write+0x5b1/0xa60 [ 947.221694][ T27] ? vfs_read+0xe10/0xe10 [ 947.231937][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 947.244666][ T27] ? down_read_killable+0x1d2/0x350 [ 947.249896][ T27] __dump_emit+0x264/0x3a0 [ 947.269645][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 947.289862][ T27] ? dump_emit+0x152/0x3f0 [ 947.294634][ T27] dump_user_range+0x91/0x320 [ 947.299338][ T27] elf_core_dump+0x3c7d/0x4570 [ 947.314606][ T27] ? reacquire_held_locks+0x660/0x660 [ 947.320030][ T27] ? load_elf_library+0xa40/0xa40 [ 947.338847][ T27] ? mark_lock+0x98/0x340 [ 947.370111][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 947.375608][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 947.381092][ T27] ? kmem_cache_alloc+0x128/0x280 [ 947.392949][ T27] do_coredump+0x1852/0x31e0 [ 947.409404][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 947.415560][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 947.421162][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 947.434183][ T27] ? get_signal+0x8ac/0x14e0 [ 947.438805][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 947.449778][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 947.455307][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 947.460517][ T27] get_signal+0xc06/0x14e0 [ 947.471389][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 947.477329][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 947.482542][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 947.489260][ T27] ? _raw_spin_unlock+0x40/0x40 [ 947.494290][ T27] ? get_sigframe_size+0x10/0x10 [ 947.525786][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 947.531845][ T27] ? force_sig+0x114/0x1d0 [ 947.554077][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 947.559580][ T27] exit_to_user_mode_loop+0x97/0x130 [ 947.584064][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 947.589652][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 947.614092][ T27] exc_general_protection+0x358/0x4f0 [ 947.619509][ T27] ? vtime_user_enter+0x1eb/0x2d0 [ 947.634008][ T27] ? __context_tracking_enter+0x5f/0x90 [ 947.639612][ T27] asm_exc_general_protection+0x22/0x30 [ 947.653085][ T27] RIP: 0033:0x7fb4f4d59db1 [ 947.672021][ T27] RSP: 002b:0000000020000550 EFLAGS: 00010217 [ 947.684576][ T27] RAX: 0000000000000000 RBX: 00007fb4f4e88050 RCX: 00007fb4f4d59da9 [ 947.692861][ T27] RDX: 0000000020000580 RSI: 0000000020000550 RDI: 0000000000080200 [ 947.706853][ T27] RBP: 00007fb4f4da647a R08: 0000000020000600 R09: 0000000020000600 [ 947.717517][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000 [ 947.729257][ T27] R13: 000000000000006e R14: 00007fb4f4e88050 R15: 00007ffd352f5538 [ 947.743815][ T27] [ 947.750671][ T27] INFO: task syz-executor.3:20250 blocked for more than 146 seconds. [ 947.762083][ T27] Not tainted 5.15.151-syzkaller #0 [ 947.771501][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 947.783080][ T27] task:syz-executor.3 state:D stack:21152 pid:20250 ppid: 19922 flags:0x00004002 [ 947.794102][ T27] Call Trace: [ 947.804026][ T27] [ 947.806976][ T27] __schedule+0x12c4/0x45b0 [ 947.811491][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 947.834072][ T27] ? print_irqtrace_events+0x210/0x210 [ 947.840050][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 947.854008][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 947.859936][ T27] ? __sched_text_start+0x8/0x8 [ 947.884106][ T27] ? __might_sleep+0xc0/0xc0 [ 947.888745][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 947.901497][ T27] schedule+0x11b/0x1f0 [ 947.906012][ T27] wb_wait_for_completion+0x164/0x290 [ 947.911402][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 947.934079][ T27] ? init_wait_entry+0xd0/0xd0 [ 947.939590][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 947.954014][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 947.959415][ T27] ? down_read_trylock+0x24a/0x3b0 [ 947.966841][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 947.974273][ T27] ? cpumask_next+0xc3/0xf0 [ 947.978800][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 948.004045][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 948.009631][ T27] ext4_da_write_begin+0x228/0xb60 [ 948.024011][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 948.030029][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 948.044008][ T27] ? rcu_is_watching+0x11/0xa0 [ 948.048800][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 948.068486][ T27] generic_perform_write+0x2bf/0x5b0 [ 948.073806][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 948.104013][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 948.109872][ T27] ? ext4_write_checks+0x255/0x2c0 [ 948.125316][ T27] ext4_buffered_write_iter+0x227/0x360 [ 948.130907][ T27] ext4_file_write_iter+0x87c/0x1990 [ 948.154000][ T27] ? _raw_spin_unlock+0x24/0x40 [ 948.158883][ T27] ? follow_page_pte+0xad5/0xb60 [ 948.164389][ T27] ? follow_page_mask+0xb59/0x13f0 [ 948.169523][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 948.175175][ T27] ? follow_page+0x130/0x130 [ 948.179770][ T27] ? find_vma+0xd3/0x230 [ 948.184389][ T27] ? check_vma_flags+0x407/0x490 [ 948.189331][ T27] ? iov_iter_kvec+0x4a/0x170 [ 948.194066][ T27] __kernel_write+0x5b1/0xa60 [ 948.198758][ T27] ? vfs_read+0xe10/0xe10 [ 948.203105][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 948.209256][ T27] ? down_read_killable+0x1d2/0x350 [ 948.214980][ T27] ? __dump_emit+0x199/0x3a0 [ 948.219578][ T27] __dump_emit+0x264/0x3a0 [ 948.224126][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 948.229593][ T27] ? dump_emit+0x152/0x3f0 [ 948.234249][ T27] dump_user_range+0x91/0x320 [ 948.238943][ T27] elf_core_dump+0x3c7d/0x4570 [ 948.243709][ T27] ? reacquire_held_locks+0x660/0x660 [ 948.269699][ T27] ? load_elf_library+0xa40/0xa40 [ 948.275046][ T27] ? mark_lock+0x98/0x340 [ 948.279488][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 948.310716][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 948.318150][ T27] ? kmem_cache_alloc+0x128/0x280 [ 948.323203][ T27] do_coredump+0x1852/0x31e0 [ 948.343124][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 948.364001][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 948.369686][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 948.375331][ T27] ? get_signal+0x8ac/0x14e0 [ 948.379946][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 948.394023][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 948.399246][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 948.414006][ T27] get_signal+0xc06/0x14e0 [ 948.418466][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 948.440391][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 948.450022][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 948.463910][ T27] ? _raw_spin_unlock+0x40/0x40 [ 948.469092][ T27] ? get_sigframe_size+0x10/0x10 [ 948.474320][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 948.479900][ T27] ? force_sig+0x114/0x1d0 [ 948.492136][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 948.497909][ T27] exit_to_user_mode_loop+0x97/0x130 [ 948.503215][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 948.509159][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 948.514912][ T27] exc_general_protection+0x358/0x4f0 [ 948.524197][ T27] ? vtime_user_enter+0x1eb/0x2d0 [ 948.529239][ T27] ? __context_tracking_enter+0x5f/0x90 [ 948.536957][ T27] asm_exc_general_protection+0x22/0x30 [ 948.542522][ T27] RIP: 0033:0x7fb4f4d59db1 [ 948.564092][ T27] RSP: 002b:0000000020000550 EFLAGS: 00010217 [ 948.570189][ T27] RAX: 0000000000000000 RBX: 00007fb4f4e87f80 RCX: 00007fb4f4d59da9 [ 948.586069][ T27] RDX: 0000000020000580 RSI: 0000000020000550 RDI: 0000000000080200 [ 948.613611][ T27] RBP: 00007fb4f4da647a R08: 0000000020000600 R09: 0000000020000600 [ 948.634112][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000 [ 948.642219][ T27] R13: 000000000000000b R14: 00007fb4f4e87f80 R15: 00007ffd352f5538 [ 948.669378][ T27] [ 948.672478][ T27] INFO: task syz-executor.1:20253 blocked for more than 147 seconds. [ 948.692773][ T27] Not tainted 5.15.151-syzkaller #0 [ 948.699897][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 948.724117][ T27] task:syz-executor.1 state:D stack:21248 pid:20253 ppid: 19918 flags:0x00004002 [ 948.733346][ T27] Call Trace: [ 948.753786][ T27] [ 948.760087][ T27] __schedule+0x12c4/0x45b0 [ 948.764892][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 948.770885][ T27] ? print_irqtrace_events+0x210/0x210 [ 948.786200][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 948.791455][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 948.797825][ T27] ? __sched_text_start+0x8/0x8 [ 948.802690][ T27] ? __might_sleep+0xc0/0xc0 [ 948.807645][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 948.813121][ T27] schedule+0x11b/0x1f0 [ 948.817667][ T27] wb_wait_for_completion+0x164/0x290 [ 948.823088][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 948.830024][ T27] ? init_wait_entry+0xd0/0xd0 [ 948.835117][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 948.841115][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 948.846861][ T27] ? down_read_trylock+0x24a/0x3b0 [ 948.851985][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 948.866043][ T27] ? ktime_get_coarse_real_ts64+0x36/0x120 [ 948.871875][ T27] ? cpumask_next+0xc3/0xf0 [ 948.892218][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 948.914211][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 948.919801][ T27] ext4_da_write_begin+0x228/0xb60 [ 948.927279][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 948.932586][ T27] ? current_time+0x1af/0x2f0 [ 948.953263][ T27] ? atime_needs_update+0x7b0/0x7b0 [ 948.958855][ T27] generic_perform_write+0x2bf/0x5b0 [ 948.964918][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 948.970746][ T27] ? ext4_write_checks+0x255/0x2c0 [ 948.976321][ T27] ext4_buffered_write_iter+0x227/0x360 [ 948.981888][ T27] ext4_file_write_iter+0x87c/0x1990 [ 948.989261][ T27] ? _raw_spin_unlock+0x24/0x40 [ 949.004099][ T27] ? follow_page_pte+0xad5/0xb60 [ 949.009068][ T27] ? follow_page_mask+0xb59/0x13f0 [ 949.017928][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 949.024233][ T27] ? follow_page+0x130/0x130 [ 949.028834][ T27] ? find_vma+0xd3/0x230 [ 949.033076][ T27] ? check_vma_flags+0x407/0x490 [ 949.054027][ T27] ? iov_iter_kvec+0x4a/0x170 [ 949.064949][ T27] __kernel_write+0x5b1/0xa60 [ 949.074254][ T27] ? vfs_read+0xe10/0xe10 [ 949.078606][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 949.083647][ T27] ? down_read_killable+0x1d2/0x350 [ 949.105995][ T27] __dump_emit+0x264/0x3a0 [ 949.110461][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 949.121569][ T27] ? dump_emit+0x152/0x3f0 [ 949.130354][ T27] dump_user_range+0x91/0x320 [ 949.135953][ T27] elf_core_dump+0x3c7d/0x4570 [ 949.140726][ T27] ? reacquire_held_locks+0x660/0x660 [ 949.149494][ T27] ? load_elf_library+0xa40/0xa40 [ 949.154734][ T27] ? mark_lock+0x98/0x340 [ 949.162198][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 949.178359][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 949.183851][ T27] ? kmem_cache_alloc+0x128/0x280 [ 949.199560][ T27] do_coredump+0x1852/0x31e0 [ 949.207900][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 949.213127][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 949.222449][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 949.236268][ T27] ? get_signal+0x8ac/0x14e0 [ 949.240896][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 949.246932][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 949.252165][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 949.257721][ T27] get_signal+0xc06/0x14e0 [ 949.262164][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 949.268180][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 949.273874][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 949.287360][ T27] ? _raw_spin_unlock+0x40/0x40 [ 949.292238][ T27] ? get_sigframe_size+0x10/0x10 [ 949.301014][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 949.334030][ T27] ? force_sig+0x114/0x1d0 [ 949.338487][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 949.343954][ T27] exit_to_user_mode_loop+0x97/0x130 [ 949.359297][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 949.384053][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 949.389551][ T27] exc_general_protection+0x358/0x4f0 [ 949.414168][ T27] ? vtime_user_enter+0x1eb/0x2d0 [ 949.424249][ T27] ? __context_tracking_enter+0x5f/0x90 [ 949.429841][ T27] asm_exc_general_protection+0x22/0x30 [ 949.463999][ T27] RIP: 0033:0x7f60ad500db1 [ 949.468447][ T27] RSP: 002b:0000000020000560 EFLAGS: 00010217 [ 949.484000][ T27] RAX: 0000000000000000 RBX: 00007f60ad62ef80 RCX: 00007f60ad500da9 [ 949.492031][ T27] RDX: 0000000020000580 RSI: 0000000020000560 RDI: 0000000000080200 [ 949.524073][ T27] RBP: 00007f60ad54d47a R08: 0000000020000600 R09: 0000000020000600 [ 949.532080][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000 [ 949.551479][ T27] R13: 000000000000000b R14: 00007f60ad62ef80 R15: 00007ffcaf8f5118 [ 949.582284][ T27] [ 949.594013][ T27] INFO: task syz-executor.3:20260 blocked for more than 148 seconds. [ 949.602094][ T27] Not tainted 5.15.151-syzkaller #0 [ 949.634025][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 949.642724][ T27] task:syz-executor.3 state:D stack:20952 pid:20260 ppid: 19922 flags:0x00004002 [ 949.660557][ T27] Call Trace: [ 949.670347][ T27] [ 949.673298][ T27] __schedule+0x12c4/0x45b0 [ 949.694038][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 949.700157][ T27] ? print_irqtrace_events+0x210/0x210 [ 949.724005][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 949.729231][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 949.751762][ T27] ? __sched_text_start+0x8/0x8 [ 949.774063][ T27] ? __might_sleep+0xc0/0xc0 [ 949.778695][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 949.794005][ T27] schedule+0x11b/0x1f0 [ 949.798197][ T27] wb_wait_for_completion+0x164/0x290 [ 949.803581][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 949.824315][ T27] ? init_wait_entry+0xd0/0xd0 [ 949.829132][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 949.835102][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 949.840488][ T27] ? down_read_trylock+0x24a/0x3b0 [ 949.845949][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 949.851683][ T27] ? cpumask_next+0xc3/0xf0 [ 949.856620][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 949.861939][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 949.867934][ T27] ext4_da_write_begin+0x228/0xb60 [ 949.873070][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 949.879512][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 949.885559][ T27] ? rcu_is_watching+0x11/0xa0 [ 949.890338][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 949.897604][ T27] generic_perform_write+0x2bf/0x5b0 [ 949.903032][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 949.908945][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 949.915054][ T27] ? ext4_write_checks+0x255/0x2c0 [ 949.920177][ T27] ext4_buffered_write_iter+0x227/0x360 [ 949.926126][ T27] ext4_file_write_iter+0x87c/0x1990 [ 949.931421][ T27] ? _raw_spin_unlock+0x24/0x40 [ 949.936804][ T27] ? follow_page_pte+0xad5/0xb60 [ 949.941855][ T27] ? follow_page_mask+0xb59/0x13f0 [ 949.954014][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 949.959327][ T27] ? follow_page+0x130/0x130 [ 949.963921][ T27] ? find_vma+0xd3/0x230 [ 949.984038][ T27] ? check_vma_flags+0x407/0x490 [ 949.989512][ T27] ? iov_iter_kvec+0x4a/0x170 [ 950.004010][ T27] __kernel_write+0x5b1/0xa60 [ 950.008729][ T27] ? vfs_read+0xe10/0xe10 [ 950.013062][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 950.034092][ T27] ? down_read_killable+0x1d2/0x350 [ 950.039344][ T27] __dump_emit+0x264/0x3a0 [ 950.043775][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 950.065316][ T27] ? dump_emit+0x152/0x3f0 [ 950.069770][ T27] ? dump_user_range+0x11/0x320 [ 950.084018][ T27] ? dump_user_range+0xf4/0x320 [ 950.089791][ T27] dump_user_range+0x91/0x320 [ 950.100491][ T27] elf_core_dump+0x3c7d/0x4570 [ 950.105526][ T27] ? reacquire_held_locks+0x660/0x660 [ 950.110931][ T27] ? load_elf_library+0xa40/0xa40 [ 950.121963][ T27] ? mark_lock+0x98/0x340 [ 950.128224][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 950.133299][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 950.148606][ T27] ? kmem_cache_alloc+0x128/0x280 [ 950.153659][ T27] do_coredump+0x1852/0x31e0 [ 950.159768][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 950.169661][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 950.176780][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 950.181849][ T27] ? get_signal+0x8ac/0x14e0 [ 950.196646][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 950.201891][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 950.210811][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 950.220996][ T27] get_signal+0xc06/0x14e0 [ 950.229088][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 950.239035][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 950.247832][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 950.253741][ T27] ? _raw_spin_unlock+0x40/0x40 [ 950.261179][ T27] ? get_sigframe_size+0x10/0x10 [ 950.269713][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 950.277745][ T27] ? force_sig+0x114/0x1d0 [ 950.282179][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 950.291362][ T27] exit_to_user_mode_loop+0x97/0x130 [ 950.298065][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 950.303634][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 950.309511][ T27] exc_general_protection+0x358/0x4f0 [ 950.315165][ T27] ? vtime_user_enter+0x1eb/0x2d0 [ 950.320201][ T27] ? __context_tracking_enter+0x5f/0x90 [ 950.326363][ T27] asm_exc_general_protection+0x22/0x30 [ 950.331918][ T27] RIP: 0033:0x7fb4f4d59db1 [ 950.336645][ T27] RSP: 002b:0000000020000550 EFLAGS: 00010217 [ 950.342717][ T27] RAX: 0000000000000000 RBX: 00007fb4f4e87f80 RCX: 00007fb4f4d59da9 [ 950.352585][ T27] RDX: 0000000020000580 RSI: 0000000020000550 RDI: 0000000000080200 [ 950.360809][ T27] RBP: 00007fb4f4da647a R08: 0000000020000600 R09: 0000000020000600 [ 950.369029][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000 [ 950.377296][ T27] R13: 000000000000000b R14: 00007fb4f4e87f80 R15: 00007ffd352f5538 [ 950.388931][ T27] [ 950.392238][ T27] INFO: task syz-executor.1:20270 blocked for more than 148 seconds. [ 950.403332][ T27] Not tainted 5.15.151-syzkaller #0 [ 950.413325][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 950.424560][ T27] task:syz-executor.1 state:D stack:20984 pid:20270 ppid: 19918 flags:0x00004002 [ 950.433781][ T27] Call Trace: [ 950.441964][ T27] [ 950.445156][ T27] __schedule+0x12c4/0x45b0 [ 950.449678][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 950.457864][ T27] ? print_irqtrace_events+0x210/0x210 [ 950.463339][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 950.468914][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 950.475105][ T27] ? __sched_text_start+0x8/0x8 [ 950.479968][ T27] ? __might_sleep+0xc0/0xc0 [ 950.484889][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 950.490367][ T27] schedule+0x11b/0x1f0 [ 950.494865][ T27] wb_wait_for_completion+0x164/0x290 [ 950.501168][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 950.508092][ T27] ? init_wait_entry+0xd0/0xd0 [ 950.512970][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 950.518899][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 950.524526][ T27] ? down_read_trylock+0x24a/0x3b0 [ 950.529646][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 950.535875][ T27] ? cpumask_next+0xc3/0xf0 [ 950.540596][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 950.546237][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 950.551794][ T27] ext4_da_write_begin+0x228/0xb60 [ 950.557260][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 950.563257][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 950.570500][ T27] ? rcu_is_watching+0x11/0xa0 [ 950.575548][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 950.580758][ T27] generic_perform_write+0x2bf/0x5b0 [ 950.586362][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 950.591673][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 950.597863][ T27] ? ext4_write_checks+0x255/0x2c0 [ 950.603443][ T27] ext4_buffered_write_iter+0x227/0x360 [ 950.609346][ T27] ext4_file_write_iter+0x87c/0x1990 [ 950.614946][ T27] ? _raw_spin_unlock+0x24/0x40 [ 950.619883][ T27] ? follow_page_pte+0xad5/0xb60 [ 950.625187][ T27] ? follow_page_mask+0xb59/0x13f0 [ 950.630421][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 950.636221][ T27] ? follow_page+0x130/0x130 [ 950.640828][ T27] ? find_vma+0xd3/0x230 [ 950.645423][ T27] ? check_vma_flags+0x407/0x490 [ 950.650371][ T27] ? iov_iter_kvec+0x4a/0x170 [ 950.655524][ T27] __kernel_write+0x5b1/0xa60 [ 950.660227][ T27] ? vfs_read+0xe10/0xe10 [ 950.664924][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 950.669973][ T27] ? down_read_killable+0x1d2/0x350 [ 950.677189][ T27] __dump_emit+0x264/0x3a0 [ 950.681636][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 950.687511][ T27] ? dump_emit+0x152/0x3f0 [ 950.691950][ T27] dump_user_range+0x91/0x320 [ 950.697091][ T27] elf_core_dump+0x3c7d/0x4570 [ 950.702822][ T27] ? reacquire_held_locks+0x660/0x660 [ 950.708569][ T27] ? load_elf_library+0xa40/0xa40 [ 950.713615][ T27] ? mark_lock+0x98/0x340 [ 950.718331][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 950.723400][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 950.729230][ T27] ? kmem_cache_alloc+0x128/0x280 [ 950.734539][ T27] do_coredump+0x1852/0x31e0 [ 950.739135][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 950.744670][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 950.750336][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 950.755788][ T27] ? get_signal+0x8ac/0x14e0 [ 950.760389][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 950.765971][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 950.771181][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 950.776764][ T27] get_signal+0xc06/0x14e0 [ 950.781202][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 950.788850][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 950.794329][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 950.800234][ T27] ? _raw_spin_unlock+0x40/0x40 [ 950.806169][ T27] ? get_sigframe_size+0x10/0x10 [ 950.811123][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 950.822705][ T27] ? force_sig+0x114/0x1d0 [ 950.827369][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 950.832844][ T27] exit_to_user_mode_loop+0x97/0x130 [ 950.844194][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 950.849754][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 950.862390][ T27] exc_general_protection+0x358/0x4f0 [ 950.869159][ T27] ? vtime_user_enter+0x1eb/0x2d0 [ 950.878938][ T27] ? __context_tracking_enter+0x5f/0x90 [ 950.885921][ T27] asm_exc_general_protection+0x22/0x30 [ 950.891480][ T27] RIP: 0033:0x7f60ad500db1 [ 950.902366][ T27] RSP: 002b:0000000020000560 EFLAGS: 00010217 [ 950.911109][ T27] RAX: 0000000000000000 RBX: 00007f60ad62ef80 RCX: 00007f60ad500da9 [ 950.923885][ T27] RDX: 0000000020000580 RSI: 0000000020000560 RDI: 0000000000080200 [ 950.932164][ T27] RBP: 00007f60ad54d47a R08: 0000000020000600 R09: 0000000020000600 [ 950.940515][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000 [ 950.948774][ T27] R13: 000000000000000b R14: 00007f60ad62ef80 R15: 00007ffcaf8f5118 [ 950.957111][ T27] [ 950.960193][ T27] INFO: task syz-executor.3:20273 blocked for more than 149 seconds. [ 950.968625][ T27] Not tainted 5.15.151-syzkaller #0 [ 950.974771][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 950.983445][ T27] task:syz-executor.3 state:D stack:21048 pid:20273 ppid: 19922 flags:0x00004002 [ 950.993058][ T27] Call Trace: [ 950.996576][ T27] [ 950.999512][ T27] __schedule+0x12c4/0x45b0 [ 951.006067][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 951.012544][ T27] ? print_irqtrace_events+0x210/0x210 [ 951.018401][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 951.023612][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 951.029893][ T27] ? __sched_text_start+0x8/0x8 [ 951.035063][ T27] ? __might_sleep+0xc0/0xc0 [ 951.039674][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 951.045547][ T27] schedule+0x11b/0x1f0 [ 951.049717][ T27] wb_wait_for_completion+0x164/0x290 [ 951.055561][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 951.062177][ T27] ? init_wait_entry+0xd0/0xd0 [ 951.067415][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 951.072988][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 951.078769][ T27] ? down_read_trylock+0x24a/0x3b0 [ 951.083894][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 951.089999][ T27] ? cpumask_next+0xc3/0xf0 [ 951.094824][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 951.100208][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 951.106127][ T27] ext4_da_write_begin+0x228/0xb60 [ 951.111247][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 951.119706][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 951.125279][ T27] ? rcu_is_watching+0x11/0xa0 [ 951.130054][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 951.135613][ T27] generic_perform_write+0x2bf/0x5b0 [ 951.140909][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 951.146549][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 951.152376][ T27] ? ext4_write_checks+0x255/0x2c0 [ 951.157811][ T27] ext4_buffered_write_iter+0x227/0x360 [ 951.163376][ T27] ext4_file_write_iter+0x87c/0x1990 [ 951.169040][ T27] ? _raw_spin_unlock+0x24/0x40 [ 951.173907][ T27] ? follow_page_pte+0xad5/0xb60 [ 951.179287][ T27] ? follow_page_mask+0xb59/0x13f0 [ 951.184687][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 951.190061][ T27] ? follow_page+0x130/0x130 [ 951.194975][ T27] ? find_vma+0xd3/0x230 [ 951.199226][ T27] ? check_vma_flags+0x407/0x490 [ 951.204511][ T27] ? iov_iter_kvec+0x4a/0x170 [ 951.209201][ T27] __kernel_write+0x5b1/0xa60 [ 951.214659][ T27] ? vfs_read+0xe10/0xe10 [ 951.219006][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 951.226068][ T27] ? down_read_killable+0x1d2/0x350 [ 951.231288][ T27] __dump_emit+0x264/0x3a0 [ 951.236034][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 951.241511][ T27] ? dump_emit+0x152/0x3f0 [ 951.246321][ T27] dump_user_range+0x91/0x320 [ 951.251016][ T27] elf_core_dump+0x3c7d/0x4570 [ 951.256396][ T27] ? reacquire_held_locks+0x660/0x660 [ 951.261826][ T27] ? load_elf_library+0xa40/0xa40 [ 951.267274][ T27] ? mark_lock+0x98/0x340 [ 951.271625][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 951.277031][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 951.282512][ T27] ? kmem_cache_alloc+0x128/0x280 [ 951.287998][ T27] do_coredump+0x1852/0x31e0 [ 951.292603][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 951.298153][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 951.303740][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 951.309179][ T27] ? get_signal+0x8ac/0x14e0 [ 951.313786][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 951.320012][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 951.325755][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 951.330965][ T27] get_signal+0xc06/0x14e0 [ 951.337402][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 951.343235][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 951.348874][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 951.355011][ T27] ? _raw_spin_unlock+0x40/0x40 [ 951.359876][ T27] ? get_sigframe_size+0x10/0x10 [ 951.365181][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 951.370745][ T27] ? force_sig+0x114/0x1d0 [ 951.375491][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 951.380966][ T27] exit_to_user_mode_loop+0x97/0x130 [ 951.386616][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 951.392174][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 951.397949][ T27] exc_general_protection+0x358/0x4f0 [ 951.403338][ T27] ? vtime_user_enter+0x1eb/0x2d0 [ 951.408812][ T27] ? __context_tracking_enter+0x5f/0x90 [ 951.414607][ T27] asm_exc_general_protection+0x22/0x30 [ 951.420588][ T27] RIP: 0033:0x7fb4f4d59db1 [ 951.425364][ T27] RSP: 002b:0000000020000550 EFLAGS: 00010217 [ 951.431437][ T27] RAX: 0000000000000000 RBX: 00007fb4f4e87f80 RCX: 00007fb4f4d59da9 [ 951.439747][ T27] RDX: 0000000020000580 RSI: 0000000020000550 RDI: 0000000000080200 [ 951.449638][ T27] RBP: 00007fb4f4da647a R08: 0000000020000600 R09: 0000000020000600 [ 951.457855][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000 [ 951.466144][ T27] R13: 000000000000000b R14: 00007fb4f4e87f80 R15: 00007ffd352f5538 [ 951.474349][ T27] [ 951.477430][ T27] INFO: task syz-executor.3:20283 blocked for more than 150 seconds. [ 951.485819][ T27] Not tainted 5.15.151-syzkaller #0 [ 951.491532][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 951.500562][ T27] task:syz-executor.3 state:D stack:20920 pid:20283 ppid: 19922 flags:0x00004002 [ 951.510173][ T27] Call Trace: [ 951.513461][ T27] [ 951.516718][ T27] __schedule+0x12c4/0x45b0 [ 951.521660][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 951.528028][ T27] ? print_irqtrace_events+0x210/0x210 [ 951.533505][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 951.539038][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 951.545215][ T27] ? __sched_text_start+0x8/0x8 [ 951.550095][ T27] ? __might_sleep+0xc0/0xc0 [ 951.556666][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 951.562143][ T27] schedule+0x11b/0x1f0 [ 951.566680][ T27] wb_wait_for_completion+0x164/0x290 [ 951.572064][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 951.579078][ T27] ? init_wait_entry+0xd0/0xd0 [ 951.583876][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 951.589888][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 951.595523][ T27] ? down_read_trylock+0x24a/0x3b0 [ 951.600643][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 951.606730][ T27] ? cpumask_next+0xc3/0xf0 [ 951.611241][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 951.616872][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 951.622432][ T27] ext4_da_write_begin+0x228/0xb60 [ 951.628403][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 951.634692][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 951.639990][ T27] ? rcu_is_watching+0x11/0xa0 [ 951.645131][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 951.650340][ T27] generic_perform_write+0x2bf/0x5b0 [ 951.656257][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 951.661576][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 951.669440][ T27] ? ext4_write_checks+0x255/0x2c0 [ 951.674829][ T27] ext4_buffered_write_iter+0x227/0x360 [ 951.680401][ T27] ext4_file_write_iter+0x87c/0x1990 [ 951.686076][ T27] ? _raw_spin_unlock+0x24/0x40 [ 951.690941][ T27] ? follow_page_pte+0xad5/0xb60 [ 951.696271][ T27] ? follow_page_mask+0xb59/0x13f0 [ 951.701405][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 951.707079][ T27] ? follow_page+0x130/0x130 [ 951.711680][ T27] ? find_vma+0xd3/0x230 [ 951.716276][ T27] ? check_vma_flags+0x407/0x490 [ 951.721218][ T27] ? iov_iter_kvec+0x4a/0x170 [ 951.726705][ T27] __kernel_write+0x5b1/0xa60 [ 951.731411][ T27] ? vfs_read+0xe10/0xe10 [ 951.736144][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 951.741189][ T27] ? down_read_killable+0x1d2/0x350 [ 951.746763][ T27] __dump_emit+0x264/0x3a0 [ 951.751203][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 951.757017][ T27] ? dump_emit+0x152/0x3f0 [ 951.761450][ T27] dump_user_range+0x91/0x320 [ 951.766518][ T27] elf_core_dump+0x3c7d/0x4570 [ 951.771291][ T27] ? reacquire_held_locks+0x660/0x660 [ 951.778785][ T27] ? load_elf_library+0xa40/0xa40 [ 951.783842][ T27] ? mark_lock+0x98/0x340 [ 951.788616][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 951.793694][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 951.799544][ T27] ? kmem_cache_alloc+0x128/0x280 [ 951.804905][ T27] do_coredump+0x1852/0x31e0 [ 951.809506][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 951.815029][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 951.820610][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 951.826093][ T27] ? get_signal+0x8ac/0x14e0 [ 951.831391][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 951.836937][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 951.842153][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 951.847739][ T27] get_signal+0xc06/0x14e0 [ 951.852185][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 951.858247][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 951.863455][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 951.869753][ T27] ? _raw_spin_unlock+0x40/0x40 [ 951.874843][ T27] ? get_sigframe_size+0x10/0x10 [ 951.879790][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 951.887437][ T27] ? force_sig+0x114/0x1d0 [ 951.891880][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 951.897846][ T27] exit_to_user_mode_loop+0x97/0x130 [ 951.903150][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 951.909107][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 951.914812][ T27] exc_general_protection+0x358/0x4f0 [ 951.920197][ T27] ? vtime_user_enter+0x1eb/0x2d0 [ 951.925852][ T27] ? __context_tracking_enter+0x5f/0x90 [ 951.931911][ T27] asm_exc_general_protection+0x22/0x30 [ 951.937842][ T27] RIP: 0033:0x7fb4f4d59db1 [ 951.942262][ T27] RSP: 002b:0000000020000550 EFLAGS: 00010217 [ 951.948439][ T27] RAX: 0000000000000000 RBX: 00007fb4f4e87f80 RCX: 00007fb4f4d59da9 [ 951.956451][ T27] RDX: 0000000020000580 RSI: 0000000020000550 RDI: 0000000000080200 [ 951.964762][ T27] RBP: 00007fb4f4da647a R08: 0000000020000600 R09: 0000000020000600 [ 951.972747][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000 [ 951.981102][ T27] R13: 000000000000000b R14: 00007fb4f4e87f80 R15: 00007ffd352f5538 [ 951.989835][ T27] [ 951.992935][ T27] [ 951.992935][ T27] Showing all locks held in the system: [ 952.002703][ T27] 1 lock held by khungtaskd/27: [ 952.007974][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 952.017629][ T27] 2 locks held by kworker/u4:1/144: [ 952.022827][ T27] #0: ffff8880b9b3a318 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 952.040120][ T27] #1: ffff8880b9a27848 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x53d/0x810 [ 952.051956][ T27] 2 locks held by getty/3257: [ 952.063650][ T27] #0: ffff88814af35098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 952.073932][ T27] #1: ffffc9000209b2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 952.090356][ T27] 4 locks held by kworker/u4:8/13979: [ 952.096039][ T27] 3 locks held by syz-executor.3/19922: [ 952.101588][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: mnt_want_write+0x3b/0x80 [ 952.118640][ T27] #1: ffff88804a1cc9b8 (&type->i_mutex_dir_key#4/1){+.+.}-{3:3}, at: do_unlinkat+0x266/0x950 [ 952.131578][ T27] #2: ffff8880408f97e0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: vfs_unlink+0xe0/0x5f0 [ 952.150757][ T27] 3 locks held by syz-executor.4/19925: [ 952.156554][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: mnt_want_write+0x3b/0x80 [ 952.171625][ T27] #1: ffff8880367567a0 (&type->i_mutex_dir_key#4/1){+.+.}-{3:3}, at: do_unlinkat+0x266/0x950 [ 952.182195][ T27] #2: ffff88803666b5c8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: vfs_unlink+0xe0/0x5f0 [ 952.203298][ T27] 3 locks held by syz-executor.1/20147: [ 952.210249][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.225258][ T27] #1: ffff888073cc21d8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.244355][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.261298][ T27] 3 locks held by syz-executor.3/20242: [ 952.268278][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.283429][ T27] #1: ffff8880408fa1d8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.303498][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.320473][ T27] 3 locks held by syz-executor.3/20250: [ 952.326579][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.343083][ T27] #1: ffff88804a1ce7a0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.362247][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.373606][ T27] 3 locks held by syz-executor.1/20253: [ 952.385017][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.403368][ T27] #1: ffff88804a1cd3b0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.421952][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.433365][ T27] 3 locks held by syz-executor.3/20260: [ 952.446058][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.459917][ T27] #1: ffff888035b2c9b8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.475606][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.490414][ T27] 3 locks held by syz-executor.1/20270: [ 952.496324][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.505920][ T27] #1: ffff88803637bfc0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.517573][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.529023][ T27] 3 locks held by syz-executor.3/20273: [ 952.534977][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.544524][ T27] #1: ffff888048c997e0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.556913][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.571584][ T27] 3 locks held by syz-executor.3/20283: [ 952.581202][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.592296][ T27] #1: ffff888048c9d3b0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.606099][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.618271][ T27] 3 locks held by syz-executor.1/20288: [ 952.623895][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.633467][ T27] #1: ffff888032e15da8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.645265][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.657354][ T27] 3 locks held by syz-executor.3/20293: [ 952.662945][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.678126][ T27] #1: ffff88802daec9b8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.692549][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.715961][ T27] 3 locks held by syz-executor.3/20303: [ 952.721518][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.734444][ T27] #1: ffff88802dae8de8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.751045][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.762225][ T27] 3 locks held by syz-executor.3/20307: [ 952.767879][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.777282][ T27] #1: ffff88803593e7a0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.788838][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.801714][ T27] 3 locks held by syz-executor.4/20331: [ 952.807402][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.816712][ T27] #1: ffff888073cc67a0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.828079][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.839250][ T27] 3 locks held by syz-executor.4/20345: [ 952.844844][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.854848][ T27] #1: ffff888035718de8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.866507][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.877891][ T27] 3 locks held by syz-executor.3/20368: [ 952.883435][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.893100][ T27] #1: ffff88803638f198 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.906467][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.917831][ T27] 3 locks held by syz-executor.4/20371: [ 952.923380][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.933214][ T27] #1: ffff8880701bf198 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.945021][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.958202][ T27] 3 locks held by syz-executor.4/20388: [ 952.963788][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 952.973505][ T27] #1: ffff88807039b5c8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 952.986147][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 952.997507][ T27] 3 locks held by syz-executor.4/20410: [ 953.003057][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 953.012717][ T27] #1: ffff8880701e49b8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 953.026113][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 953.037482][ T27] 3 locks held by syz-executor.1/20420: [ 953.043031][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 953.052874][ T27] #1: ffff8880701e53b0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 953.068613][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 953.081105][ T27] 3 locks held by syz-executor.4/20429: [ 953.091367][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 953.103195][ T27] #1: ffff88803666b5c8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 953.120476][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 953.131864][ T27] 3 locks held by syz-executor.3/20437: [ 953.144939][ T27] #0: ffff888024d4a460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 953.161291][ T27] #1: ffff8880408f97e0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 953.177308][ T27] #2: ffff888024d4a0e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 953.190377][ T27] [ 953.192709][ T27] ============================================= [ 953.192709][ T27] [ 953.201519][ T27] NMI backtrace for cpu 0 [ 953.205875][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 953.213862][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 953.223922][ T27] Call Trace: [ 953.227201][ T27] [ 953.230218][ T27] dump_stack_lvl+0x1e3/0x2cb [ 953.234912][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 953.240553][ T27] ? panic+0x84d/0x84d [ 953.244633][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 953.249942][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 953.254888][ T27] ? __wake_up_klogd+0xd5/0x100 [ 953.259745][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 953.265902][ T27] ? _printk+0xd1/0x111 [ 953.270063][ T27] ? panic+0x84d/0x84d [ 953.274138][ T27] ? __wake_up_klogd+0xcc/0x100 [ 953.278988][ T27] ? panic+0x84d/0x84d [ 953.283062][ T27] ? __rcu_read_unlock+0x92/0x100 [ 953.288090][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 953.294222][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 953.300210][ T27] watchdog+0xe72/0xeb0 [ 953.304443][ T27] kthread+0x3f6/0x4f0 [ 953.308514][ T27] ? hungtask_pm_notify+0x50/0x50 [ 953.313539][ T27] ? kthread_blkcg+0xd0/0xd0 [ 953.318132][ T27] ret_from_fork+0x1f/0x30 [ 953.322592][ T27] [ 953.326215][ T27] Sending NMI from CPU 0 to CPUs 1: [ 953.331426][ C1] NMI backtrace for cpu 1 [ 953.331437][ C1] CPU: 1 PID: 13979 Comm: kworker/u4:8 Not tainted 5.15.151-syzkaller #0 [ 953.331454][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 953.331463][ C1] Workqueue: writeback wb_workfn (flush-8:0) [ 953.331484][ C1] RIP: 0010:kasan_check_range+0x1ab/0x290 [ 953.331500][ C1] Code: e9 4c 89 d5 48 8d 5d 07 48 85 ed 48 0f 49 dd 48 83 e3 f8 48 29 dd 74 12 41 80 39 00 0f 85 a2 00 00 00 49 ff c1 48 ff cd 75 ee <5b> 41 5e 41 5f 5d c3 45 84 f6 75 61 41 f7 c6 00 ff 00 00 75 5d 41 [ 953.331511][ C1] RSP: 0018:ffffc900056aed98 EFLAGS: 00000256 [ 953.331523][ C1] RAX: ffffffff821d8e01 RBX: 1ffffd4000a98858 RCX: ffffffff821d8eb3 [ 953.331534][ C1] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffea00054c42c0 [ 953.331543][ C1] RBP: 0000000000000001 R08: dffffc0000000000 R09: fffff94000a98859 [ 953.331553][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffea00054c42c8 [ 953.331562][ C1] R13: ffffea00054c42c0 R14: fffff94000a98859 R15: ffffea00054c42c0 [ 953.331573][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 953.331585][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 953.331595][ C1] CR2: 000055c1be7b2030 CR3: 00000000238e0000 CR4: 00000000003506e0 [ 953.331608][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 953.331616][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 953.331625][ C1] Call Trace: [ 953.331630][ C1] [ 953.331635][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 953.331652][ C1] ? read_lock_is_recursive+0x10/0x10 [ 953.331668][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 953.331689][ C1] ? unknown_nmi_error+0xd0/0xd0 [ 953.331762][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 953.331775][ C1] ? nmi_handle+0xf7/0x370 [ 953.331790][ C1] ? kasan_check_range+0x1ab/0x290 [ 953.331808][ C1] ? default_do_nmi+0x62/0x150 [ 953.331823][ C1] ? exc_nmi+0xab/0x120 [ 953.331835][ C1] ? end_repeat_nmi+0x16/0x31 [ 953.331852][ C1] ? mpage_release_unused_pages+0x481/0x9a0 [ 953.331866][ C1] ? mpage_release_unused_pages+0x533/0x9a0 [ 953.331880][ C1] ? kasan_check_range+0x1ab/0x290 [ 953.331893][ C1] ? kasan_check_range+0x1ab/0x290 [ 953.331906][ C1] ? kasan_check_range+0x1ab/0x290 [ 953.331919][ C1] [ 953.331923][ C1] [ 953.331928][ C1] mpage_release_unused_pages+0x533/0x9a0 [ 953.331946][ C1] ? mpage_prepare_extent_to_map+0x1150/0x1150 [ 953.331967][ C1] ? __ext4_journal_stop+0x15b/0x190 [ 953.331982][ C1] ext4_writepages+0x2c66/0x3d10 [ 953.332013][ C1] ? ext4_readpage+0x300/0x300 [ 953.332030][ C1] ? __lock_acquire+0x1295/0x1ff0 [ 953.332053][ C1] ? ext4_readpage+0x300/0x300 [ 953.332066][ C1] do_writepages+0x481/0x730 [ 953.332082][ C1] ? __writepage+0x120/0x120 [ 953.332097][ C1] ? read_lock_is_recursive+0x10/0x10 [ 953.332110][ C1] ? writeback_sb_inodes+0x732/0x1a40 [ 953.332125][ C1] ? __lock_acquire+0x1ff0/0x1ff0 [ 953.332136][ C1] ? do_raw_spin_lock+0x14a/0x370 [ 953.332153][ C1] __writeback_single_inode+0x15b/0xe30 [ 953.332170][ C1] writeback_sb_inodes+0xbce/0x1a40 [ 953.332196][ C1] ? queue_io+0x560/0x560 [ 953.332210][ C1] ? __writeback_inodes_wb+0x400/0x400 [ 953.332229][ C1] ? queue_io+0x3d3/0x560 [ 953.332245][ C1] wb_writeback+0x451/0xc50 [ 953.332265][ C1] ? rcu_lock_release+0x20/0x20 [ 953.332278][ C1] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 953.332295][ C1] ? do_raw_spin_unlock+0x137/0x8b0 [ 953.332311][ C1] wb_workfn+0x46c/0x1130 [ 953.332324][ C1] ? mark_lock+0x98/0x340 [ 953.332345][ C1] ? inode_wait_for_writeback+0x280/0x280 [ 953.332362][ C1] ? read_lock_is_recursive+0x10/0x10 [ 953.332375][ C1] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 953.332389][ C1] ? print_irqtrace_events+0x210/0x210 [ 953.332403][ C1] ? do_raw_spin_unlock+0x137/0x8b0 [ 953.332420][ C1] process_one_work+0x8a1/0x10c0 [ 953.332457][ C1] ? worker_detach_from_pool+0x260/0x260 [ 953.332473][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 953.332487][ C1] ? kthread_data+0x4e/0xc0 [ 953.332499][ C1] ? wq_worker_running+0x97/0x170 [ 953.332514][ C1] worker_thread+0xaca/0x1280 [ 953.332527][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 953.332550][ C1] kthread+0x3f6/0x4f0 [ 953.332562][ C1] ? rcu_lock_release+0x20/0x20 [ 953.332576][ C1] ? kthread_blkcg+0xd0/0xd0 [ 953.332589][ C1] ret_from_fork+0x1f/0x30 [ 953.332609][ C1] [ 953.347894][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 953.773691][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 953.781678][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 953.791827][ T27] Call Trace: [ 953.795108][ T27] [ 953.798036][ T27] dump_stack_lvl+0x1e3/0x2cb [ 953.802720][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 953.808348][ T27] ? panic+0x84d/0x84d [ 953.812402][ T27] panic+0x318/0x84d [ 953.816284][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 953.821916][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 953.828050][ T27] ? fb_is_primary_device+0xcc/0xcc [ 953.833227][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 953.839274][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 953.845422][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 953.851572][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 953.857705][ T27] watchdog+0xeb0/0xeb0 [ 953.861858][ T27] kthread+0x3f6/0x4f0 [ 953.865931][ T27] ? hungtask_pm_notify+0x50/0x50 [ 953.870966][ T27] ? kthread_blkcg+0xd0/0xd0 [ 953.875565][ T27] ret_from_fork+0x1f/0x30 [ 953.879998][ T27] [ 953.883263][ T27] Kernel Offset: disabled [ 953.887585][ T27] Rebooting in 86400 seconds..