last executing test programs: 23m42.593565754s ago: executing program 1 (id=2518): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@float={0x1, 0x0, 0x0, 0x10, 0xc}]}}, &(0x7f0000000100)=""/4096, 0x26, 0x1000, 0x0, 0x8}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x71}, [@ldst={0x6, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x43, 0x10, &(0x7f0000000000), 0x10}, 0x94) 23m42.592226814s ago: executing program 1 (id=2519): perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x20000000, 0x100000}, 0x0, 0x0, 0x0, 0x8, 0xb, 0xd, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x20, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0xfffffffffffffd00}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000080"], 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00', @ANYRES32], 0x50) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f00000006c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff92) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000026", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x18) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000200)='((+)') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) 23m41.774060753s ago: executing program 1 (id=2531): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffc}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000200000000000000020000040800000000000000"], 0x0, 0x56}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000540), &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f00000005c0), 0x0, 0x10, &(0x7f00000006c0), 0x0, 0x0, 0xe4, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x18, 0x27, &(0x7f0000000ec0)=ANY=[@ANYBLOB="180000004600000000000000faffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000f1f300008d00000086000000072202000200000085000000a00043f5464721410f772d429b0000851000000102000024642a9aa5110000a845077d1a1e12882d13", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000070000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b702000000000000850000000b010000b7000000000000009500000000000000"], &(0x7f0000000940)='syzkaller\x00', 0xac, 0x8b, &(0x7f0000000b00)=""/139, 0x40f00, 0x42, '\x00', r2, 0x0, r0, 0x8, &(0x7f0000000c00)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000c40)={0x4, 0x3, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c80)=[r0, r0], &(0x7f0000000d80)=[{0x4, 0x3}, {0x4, 0x2, 0x3, 0x8}], 0x10, 0x604}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x100600, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfdd9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=ANY=[@ANYBLOB="1808000b00000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000035090100013800002c00000000000000b7020000000000007b9af8ff00000000b509000000000000dbaaf8fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffc70200000800000018220000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r2, r1, 0x0, 0x1}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x41000, 0x44, '\x00', r2, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x1, 0x0, 0x8, 0x18000000}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0x37}, 0x94) syz_clone(0x200800, 0x0, 0x0, &(0x7f0000000680), &(0x7f0000000700), &(0x7f0000001840)="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") r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0xa00, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'dvmrp1\x00', 0x2}) r6 = openat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000000540), 0x2, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000003000000000000000040000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000005000000850000000600000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r10}, 0xc) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNGETSNDBUF(r11, 0x800454d3, &(0x7f0000000740)) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r11, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x50}, {0x6}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r8, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1b, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r12, r8, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x4, 0xfffff020}, {0x6, 0x0, 0x6, 0x2010000}]}) 23m41.502896049s ago: executing program 1 (id=2537): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xf1, 0x0, 0xb6, 0x0, 0x0, 0xb, 0x1419, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x3}, 0x8000, 0x3, 0x0, 0x0, 0xe2a7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800000007}, 0x0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001140), 0x420040, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x8, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000faffffff850000002d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000001fcffff850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001080)={{r4}, &(0x7f0000001000), &(0x7f0000001040)}, 0x20) 23m41.312776411s ago: executing program 1 (id=2541): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESHEX, @ANYBLOB="c543da2e", @ANYRES16], 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/16, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="8fedcb79070311"], 0xfdef) close(r4) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0xf3, 0xa, 0x0, 0x0, 0xd006e1258c4875cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0xc20, 0xc8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, 0x0, 0x0}, 0x38) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000000000000f37538e486dd630080fc5c082c00db5bffffffffff000000060300000023000000000000000000000000ac1414aa2c200007"], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000180)=[0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x8, 0xfffffffc, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x15, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x4000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x800000}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @sk_reuseport=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) write$cgroup_pid(r7, 0x0, 0x7ffffffff000) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000001400)={'ipvlan0\x00', @broadcast}) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@enum64={0x5, 0x1, 0x0, 0x13, 0x0, 0x2, [{0xe, 0x0, 0x7fff}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0xd7}}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/208, 0x4b, 0xd0, 0x0, 0x7}, 0x28) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000b80)={r0, 0xffffffffffffffff}, 0x4) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000e80)={0x1b, 0x0, 0x0, 0x10000, 0x0, 0xffffffffffffffff, 0x7, '\x00', r6, r8, 0x3, 0x3, 0x4}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f80)=@bpf_ext={0x1c, 0x17, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @generic={0x5, 0x1, 0x0, 0x6, 0xd}, @jmp={0x5, 0x1, 0x8, 0xa, 0xc, 0xfffffffffffffff8, 0x1}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], &(0x7f0000000c80)='syzkaller\x00', 0x9d, 0x3, &(0x7f0000000cc0)=""/3, 0x41100, 0x20, '\x00', r6, 0x0, r8, 0x8, &(0x7f0000000d00)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000d40)={0x3, 0x4, 0x55f, 0x3}, 0x10, 0x28cc8, 0xffffffffffffffff, 0x1, &(0x7f0000000f00)=[r1, r0, 0xffffffffffffffff, r1, r10, r1], &(0x7f0000000f40)=[{0x4, 0x2, 0xd, 0xe}]}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000440), &(0x7f00000004c0)=[0x0, 0x0], 0x0, 0xf, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f0000000080), 0x8, 0x19, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}}, @exit]}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x2, 0x8, 0x3, 0x7fffffff}, 0x10, 0x15dd8, 0xffffffffffffffff, 0x1, &(0x7f0000000840)=[r0, r0, r0, r0], &(0x7f0000000880)=[{0x2, 0x2, 0x3, 0x2}], 0x10, 0x8}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd1, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0xae31cbdd19177e23, 0x5, 0x5, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="280100000000"], 0x128}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x10140) bpf$OBJ_GET_MAP(0x7, &(0x7f00000009c0)=@generic={&(0x7f0000000980)='./file0\x00', 0x0, 0x8}, 0x18) 23m41.214266066s ago: executing program 1 (id=2543): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.swap.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340)=r0, 0x4) r2 = syz_clone(0x1000000, &(0x7f0000001bc0)="864364fb9fd038f33a48d85637a8bed7749877e7270a660dd41c3e2da7601be069f55778307dfe2f8974ed8b371e89d34bb5bbf470eba6f3a005b7cf72f571f8f03d3c2e04d4744866a65de4b540f72e3dc53ce314d873b3954e49e7b9c9305b2179fcfb4737dbab9e3b2db296654e181e9b12d621a612bb693f8a7e59541e9870ee79696cc15d93dd39ba1b875c7f0a151cc42ed547cee04aae77428e", 0x9d, &(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)="0ce092433b6401256a66a25788a2023c964d1829816eb4f57b3195f0e1d164bfa27551c82fdaf688a6dfd96d2ff1924338ed2354a9d28bd80a0ec95348388e5041d3e5c28aacb682eb3258cf75b8e40ad55e2bf0") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000001640)=@file={0x1, '.\x00'}, 0x6e, &(0x7f0000001b40)=[{&(0x7f00000016c0)="2c789ac38b94cb75bbe680685158ce9e44464a316ceb0c8c4b998339e6f0294aa626dcc5d67cf74eda99e55f83c8212e06222d7dbc34c1", 0x37}, {&(0x7f0000001700)="a717c8762c71e0b8149d9e2ff294e155ae25541bcb562913242456b4c7fee2e42199005182697a8d70df9205a0e674b797a501da1000413be14cb80ead9d6b4192a67c91d22ad03d9d1428cdf4633588c91b1d1a08fa954d54239db1f8e3adf4cce34b9c4403a231599e6999fe25d557a11de092a218d8ea5154bbd94dfd281ab0e292e2460e44b0ba592e497025ea4aefd7c182a883b7baf49cdac9a412ca7121615e364bad42d89dba3244063e412ab8fa719d1a4fbaaa6e758ed5caf5d13434c58f0bd0dc8d", 0xc7}, {&(0x7f0000001800)="158155052b3b3872af612451ab62d058ce370bf155c8b0b82be9ba662a59fd2ebc93de6ccb4ce5840bbb11bd57fffcdf26fe99f92b575b155d8826358c88730dc356d9cc9f", 0x45}, {&(0x7f0000001880)="e03741e567178c7404448f2e1b2234d3c2dd50987816016936d818720e8f0056d4be30244d6e4d06566a2e736e76cbfdb0475f54d38327f20421c69bc57b33754831acb550e553d93ba8a101635eabd1", 0x50}, {&(0x7f0000001900)="2ca18690cf4c36f216266279719392f07ac072c1a260438b6393b41cd36f4779cad20f410c20937003298e50f100f836f9c0cdb86455ef27c0d5e269646b699bf14e859d54e1332bc0c65c96bba6e347f0b8414a08db0cb26f9f4b4ba8286361ba5c54e011d0534590a55450925e6c1b4977b630", 0x74}, {&(0x7f0000001980)="4522cd63e79dcf6d4d2610d610a30a15516290b91b15a1d336f8e1c64114a03e37b97324f9e1740368b60ef372f185f61eb69ede29444c4e134651cd86cfd5469b5d9973d7cce6326e6d5e01db1808cfb94b149c8a862c917c94dfc2486d544365640c92c9e646fd08d74a2a3424824db8090c54d64fc5d17666760101e426c5dd4f626d92fceb75a38d6d6583f2092d3d8356118400edb8759d3fc6abe78414", 0xa0}, {&(0x7f0000001a40)="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", 0xfb}], 0x7, &(0x7f0000001d80)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}], 0x20, 0x44}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r3, &(0x7f0000000180), 0x0}, 0x20) perf_event_open(&(0x7f0000000800)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x10840, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="080000000061105300"/21], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1a, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000080000000000000005000000184b000001000000000000000000000018200000", @ANYRES32=0x1, @ANYBLOB="00000000020000001860000002b8000000000000000100010018000000fbffffff0000000003000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000001830000003000000000000000000000018390000050000000000000000000000185900000c00000000000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0xb7e, 0x1000, &(0x7f0000000500)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xf, 0x9b, 0x6}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0xffffffffffffffff, 0x1], &(0x7f0000000340)=[{0x2, 0x1, 0x6, 0x6}, {0x5, 0x4, 0xe, 0x8}], 0x10, 0x47}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001f40)=ANY=[@ANYBLOB="1300000001000100030000000300000040000000", @ANYRES32=0x1, @ANYBLOB="3a6c0404336aca547fb13c006b02000000000000000000000000000000000000886d94435d49723c4af58bcd31d4c1300b32564bb62b20e4fdef034709379714dbbd0250cd968e8d96d72d3f5dd4167f7bd937314c055cb804030984d7a4af2cf625726d80ff4461734f2b24132da4200378c3621c6b8ac078dae29105183ae031c2b8fbd6b8e7f03191929b5ccb6e335eca0b4ec0c710b6f2578bf90f96a7b39be3c5071afcdfb366e3637d1a13d1c5a43c1e51a5347ed9d2a0dffb71948ec2883d8cb1fb17613fa408dfefbb0826028b3cdf504ef38a7bad5b09", @ANYBLOB="a9501eca099ca6866a29aac37f0047f158ca0816f5f35f44ce3e9c1df7a8b72133bb418583d3347c76b3c4fc352be868213314a99f773e5479e09ce540fab9dfb1113aee42fbc7905eafcf5de1dba53a8bb4c6683cbd2e6e2addd2a927d3e31fc6b175f8b1bb0aec4cfdcbdfc249bd9d9bb0335d71c90551c85667", @ANYRES32, @ANYBLOB="05000000040000000100"/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="0600000200"/20, @ANYRES32=r5, @ANYBLOB="08ea00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"/28], 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0xa8a00, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_freezer_state(r6, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_freezer_state(r7, &(0x7f0000000040)='FROZEN\x00', 0x7) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r6, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000180), 0x12) 23m26.241823235s ago: executing program 32 (id=2543): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.swap.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340)=r0, 0x4) r2 = syz_clone(0x1000000, &(0x7f0000001bc0)="864364fb9fd038f33a48d85637a8bed7749877e7270a660dd41c3e2da7601be069f55778307dfe2f8974ed8b371e89d34bb5bbf470eba6f3a005b7cf72f571f8f03d3c2e04d4744866a65de4b540f72e3dc53ce314d873b3954e49e7b9c9305b2179fcfb4737dbab9e3b2db296654e181e9b12d621a612bb693f8a7e59541e9870ee79696cc15d93dd39ba1b875c7f0a151cc42ed547cee04aae77428e", 0x9d, &(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)="0ce092433b6401256a66a25788a2023c964d1829816eb4f57b3195f0e1d164bfa27551c82fdaf688a6dfd96d2ff1924338ed2354a9d28bd80a0ec95348388e5041d3e5c28aacb682eb3258cf75b8e40ad55e2bf0") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000001640)=@file={0x1, '.\x00'}, 0x6e, &(0x7f0000001b40)=[{&(0x7f00000016c0)="2c789ac38b94cb75bbe680685158ce9e44464a316ceb0c8c4b998339e6f0294aa626dcc5d67cf74eda99e55f83c8212e06222d7dbc34c1", 0x37}, {&(0x7f0000001700)="a717c8762c71e0b8149d9e2ff294e155ae25541bcb562913242456b4c7fee2e42199005182697a8d70df9205a0e674b797a501da1000413be14cb80ead9d6b4192a67c91d22ad03d9d1428cdf4633588c91b1d1a08fa954d54239db1f8e3adf4cce34b9c4403a231599e6999fe25d557a11de092a218d8ea5154bbd94dfd281ab0e292e2460e44b0ba592e497025ea4aefd7c182a883b7baf49cdac9a412ca7121615e364bad42d89dba3244063e412ab8fa719d1a4fbaaa6e758ed5caf5d13434c58f0bd0dc8d", 0xc7}, {&(0x7f0000001800)="158155052b3b3872af612451ab62d058ce370bf155c8b0b82be9ba662a59fd2ebc93de6ccb4ce5840bbb11bd57fffcdf26fe99f92b575b155d8826358c88730dc356d9cc9f", 0x45}, {&(0x7f0000001880)="e03741e567178c7404448f2e1b2234d3c2dd50987816016936d818720e8f0056d4be30244d6e4d06566a2e736e76cbfdb0475f54d38327f20421c69bc57b33754831acb550e553d93ba8a101635eabd1", 0x50}, {&(0x7f0000001900)="2ca18690cf4c36f216266279719392f07ac072c1a260438b6393b41cd36f4779cad20f410c20937003298e50f100f836f9c0cdb86455ef27c0d5e269646b699bf14e859d54e1332bc0c65c96bba6e347f0b8414a08db0cb26f9f4b4ba8286361ba5c54e011d0534590a55450925e6c1b4977b630", 0x74}, {&(0x7f0000001980)="4522cd63e79dcf6d4d2610d610a30a15516290b91b15a1d336f8e1c64114a03e37b97324f9e1740368b60ef372f185f61eb69ede29444c4e134651cd86cfd5469b5d9973d7cce6326e6d5e01db1808cfb94b149c8a862c917c94dfc2486d544365640c92c9e646fd08d74a2a3424824db8090c54d64fc5d17666760101e426c5dd4f626d92fceb75a38d6d6583f2092d3d8356118400edb8759d3fc6abe78414", 0xa0}, {&(0x7f0000001a40)="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", 0xfb}], 0x7, &(0x7f0000001d80)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}], 0x20, 0x44}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r3, &(0x7f0000000180), 0x0}, 0x20) perf_event_open(&(0x7f0000000800)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x10840, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="080000000061105300"/21], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1a, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000080000000000000005000000184b000001000000000000000000000018200000", @ANYRES32=0x1, @ANYBLOB="00000000020000001860000002b8000000000000000100010018000000fbffffff0000000003000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000001830000003000000000000000000000018390000050000000000000000000000185900000c00000000000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0xb7e, 0x1000, &(0x7f0000000500)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xf, 0x9b, 0x6}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0xffffffffffffffff, 0x1], &(0x7f0000000340)=[{0x2, 0x1, 0x6, 0x6}, {0x5, 0x4, 0xe, 0x8}], 0x10, 0x47}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001f40)=ANY=[@ANYBLOB="1300000001000100030000000300000040000000", @ANYRES32=0x1, @ANYBLOB="3a6c0404336aca547fb13c006b02000000000000000000000000000000000000886d94435d49723c4af58bcd31d4c1300b32564bb62b20e4fdef034709379714dbbd0250cd968e8d96d72d3f5dd4167f7bd937314c055cb804030984d7a4af2cf625726d80ff4461734f2b24132da4200378c3621c6b8ac078dae29105183ae031c2b8fbd6b8e7f03191929b5ccb6e335eca0b4ec0c710b6f2578bf90f96a7b39be3c5071afcdfb366e3637d1a13d1c5a43c1e51a5347ed9d2a0dffb71948ec2883d8cb1fb17613fa408dfefbb0826028b3cdf504ef38a7bad5b09", @ANYBLOB="a9501eca099ca6866a29aac37f0047f158ca0816f5f35f44ce3e9c1df7a8b72133bb418583d3347c76b3c4fc352be868213314a99f773e5479e09ce540fab9dfb1113aee42fbc7905eafcf5de1dba53a8bb4c6683cbd2e6e2addd2a927d3e31fc6b175f8b1bb0aec4cfdcbdfc249bd9d9bb0335d71c90551c85667", @ANYRES32, @ANYBLOB="05000000040000000100"/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="0600000200"/20, @ANYRES32=r5, @ANYBLOB="08ea00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"/28], 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0xa8a00, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_freezer_state(r6, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_freezer_state(r7, &(0x7f0000000040)='FROZEN\x00', 0x7) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r6, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000180), 0x12) 4m54.100383702s ago: executing program 5 (id=20927): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x877}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000071104e00000000009500000000000000f7cd857ac5737aa46e86ed34f2bb8e26f819a832b08d994a583e3bfb"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xe, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(0x0, 0xffffffffffffffff, 0xd, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x80040, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001440)={0x6, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18110000", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x3f, &(0x7f00000005c0)=""/63, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x2, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000880)=[{0x0, 0x2, 0x4, 0x2}], 0x10, 0xfff}, 0x94) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x6, 0xc, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ff}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r4}, 0xc) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xa, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="8500000800000000070000000000000095000000000300000767672a39668c826a9f7a4aeeb8cffd43634b3188b7311d93b44a2df956f9bfa0f2481b22e488ed335ca7bc8f8b8efbef5da9db69cc5779e1ca2d51bdc61011ffdb232975df5c80c3f94c2e7402702cb37e2d1873a233ed1fb6e64ddc313ed1b60c6206fa18dbb3c0c66fb03269a67f8d3d5627a2277f04f56e501969b2c4a8bc6fa4370b46446216038f262590262bbb5c3ca0f46c091d2de8644c6d8add7aab3902ec35"], &(0x7f0000014ff5)='GPL\x00', 0x2002, 0xff6, &(0x7f0000014000)=""/4086, 0x0, 0x10, '\x00', 0x0, @fallback=0x17, r5, 0x9, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x8, [@typedef={0x9, 0x0, 0x0, 0x8, 0x2}, @struct={0x9, 0x7, 0x0, 0x4, 0x0, 0x1, [{0x2, 0x1, 0x8}, {0x9, 0x2, 0xfffffff2}, {0x9, 0x5, 0x4}, {0xf, 0x0, 0xfffffffe}, {0x4, 0x4, 0x6}, {0x8, 0xffffffff, 0x6}, {0x1, 0x5, 0x10000}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x1, 0x4}, {0x0, 0x5}, {0xf, 0x5}, {0x0, 0x2}]}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x62, 0x0, 0x21}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x5, 0x5}]}]}, {0x0, [0x2e, 0x61, 0x61, 0x0, 0x30, 0x5f]}}, &(0x7f0000000340)=""/95, 0xdc, 0x5f, 0x1, 0x1fc}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000b80)='syz0\x00', 0x1ff) socketpair(0x18, 0x2, 0x3, &(0x7f0000000000)) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 4m53.787324942s ago: executing program 5 (id=20935): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f00000005c0)=0x80000000000004) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x8, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000a79077f08acb80c03b9ffa15ba36eca61299de54cf77c9062430bc068829afff36b31fa7e358e95cfa"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x22) 4m53.786372052s ago: executing program 5 (id=20936): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="120000001d000000080000000b"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000040)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110b0000000000063513800000000009500090000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 4m53.752136644s ago: executing program 5 (id=20937): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x27) (async) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r0}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000008000000000000005805000018100000", @ANYRES32=r3, @ANYBLOB="000000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) close(r2) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r2, r4, 0x4, r1}, 0x10) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r4, 0x0, 0xb9, 0x4c, &(0x7f0000000180)="a6ebc87241a340d0e2cf238d9be59d17e46459d38768aee7dae4a5132d05a25d394d3ee90bfdb4e8fe7d6c0c6efb8c551c1ee616ae602125167b42c229ca5fcb44d4dbe9a83cc476c9b3f668c92a91dd322c4991f01cb7cde10e736732ed9da710906ec11f59d1b6d072867ac9f96d0a2214ea777c49371ad57385d41b7abff96e1d89a61c82b815de6e2eab3b6f146d9d393256e4ba8c03a509876faf0cbfac122cc1f60ce22807f709782d4d1f24200e138439d79827e77d", &(0x7f0000000400)=""/76, 0xfffffffb, 0x0, 0xdf, 0x8c, &(0x7f0000000780)="86e37adefcf042ad870c2f60e8a4d7eba6647b98df44f391476f235f0080912e3923881d56f2b3a854a6bfc9f7e474fb10bbcde5592d792049c9b80a333cb54ff0aa48905f51ec663807726b96720c2fc4147340ec08aae02bc47957ed089d31ee0e024e5354fac436eab3e974bc5925213dec731d7e84c163e042a100372bd86e1958d461673faac12999cb1b9be5dd3994640c75b7f7e32384a114f818e33a9c27a421fc6bdf1e2e69331e80070a8e6dcbf193481f7cb1489b76c28569156488633c5b17dc43fdac3d162d32d06183ae2dfbd430a1b54b90999e9f2932c1", &(0x7f0000000640)="9e76d85f0bf44e4158fe44a0b8faa8b80ef82a5ca12e8d73cc20dd24e547363da33f70aac23015b81c39c54f74808d8685bae1160d4f085f4e7471ecf0251bfe53e3ad171e1a56ef16aaa56934f2ff320cc3334a2edfca3e8e3b82cfca274c1b3e35d9384daf58b6ecfff265bff128531ca6386addb53343226d94e585292f15eccca58948e10d3784ebb0e8", 0x2, 0x0, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, r5, 0x0) (async, rerun: 64) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xd0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x80, 0x0, 0x0, 0xffdffffc, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) (async) syz_clone(0x46002080, 0x0, 0x0, 0x0, 0x0, 0x0) 4m53.6697981s ago: executing program 5 (id=20941): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000b68b16", @ANYRES32, @ANYRES64=r0, @ANYRES32=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r1, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0xc, &(0x7f00000009c0)=ANY=[@ANYBLOB="8510000005000000183b000001000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000d346f8bf948af8ff00000000bfa200000000000007020000f8ff0200006cff40f685288dd804000000efab548bc62b690000d8facc5fc498fdf1dd7087db10ffa088e8aeba73550797cd6f0000000007f1bc00000000000000000000a20a8d7a1e3e00000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x29, '\x00', r2, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x10001, 0x9, 0x23805, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x50) (async) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000c40), 0x12) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000100)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6337ce22060000fe0000000000000000000000a8080000000000000056a13571673fa708"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000005"], 0x50) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f00000000c0)=r15, 0x4) (async) sendmsg$unix(r12, &(0x7f00000006c0)={0x0, 0xfffffffffffffe96, 0x0, 0x0, 0x0, 0x0, 0x20000001}, 0x40000) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(r10, 0x400454da, &(0x7f0000000340)=r16) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0x15, &(0x7f0000000a80)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x461}, @map_val={0x18, 0x4, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x401}, @map_val={0x18, 0x5, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000800)='GPL\x00', 0x3ff, 0x0, 0x0, 0x41100, 0x0, '\x00', r16, 0x0, r9, 0x8, &(0x7f0000000840)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0xa, 0x0, 0x2815}, 0x10, 0x231b8, r3, 0x0, &(0x7f00000008c0)=[r1, r4, r10], 0x0, 0x10, 0xffffff51}, 0x94) 4m53.628882532s ago: executing program 5 (id=20942): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e400002000100000000000000ff0200000000000000000001ffaaaaaa"], 0xfdef) close(r5) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{}, 0x0, 0x0}, 0x20) recvmsg$unix(r4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce81020329"], 0xfdef) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r8 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) close(r8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080), 0x10) socketpair(0x22, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) 4m38.565031195s ago: executing program 33 (id=20942): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e400002000100000000000000ff0200000000000000000001ffaaaaaa"], 0xfdef) close(r5) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{}, 0x0, 0x0}, 0x20) recvmsg$unix(r4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce81020329"], 0xfdef) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r8 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) close(r8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080), 0x10) socketpair(0x22, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) 4.06397174s ago: executing program 4 (id=25511): perf_event_open(&(0x7f0000000180)={0x2, 0xaf, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc3, 0x5}, 0x800, 0x0, 0x0, 0x2, 0x400, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x20) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000a40)="ad4308a803a93ae832cfe6d5ef23337e0f698efa258fa9d3bc1c9df29b8749c5ffd0074397d4b10c19ca158b9169fc747e0ce81800f6ab54701b60db0d358f0341b17544b7edabe88d90fc5a63b52a5eee75baf1278b9c106f3c728d86482d41a1b38f52ef3ad9e716e77953d785625a2279cf4fd6266ccaba213de2e35c65a01968cf04d00a1ca520baf750b816fafde164d33bfafb0fee4aae07b55527d4d61deda8a79a1be0238b8309d25f34019a61f0363bd8bdf6bae02edd9d34b01b8157e510898a6e7d7217224d331981b5c2bb14d88bdc317c7a88eb04c5ef7be4021f8dbbf25c65b82d0f787de0c0b87c2d51c21e948c9c8f8077e0341b04c4ff0c0f3e7a48fae5ca15222bc350f59307d42d0670f91610d4dec94cfbbbe3b383decd29515965a3059d4b2cbed6a77948d374d320ef04b9fd74c87eef26125b3e3418aca9bd8e98db179d57611d0f85528116cae7b18393dd78c7528c45e7a8d64db9adb31bb95564d75ff0dc06fb71fc52ee5c02779cb166d93180cbd74ab3fb7e19b3509381c4e2b6e9cb7953347d0993c3d7445d201aa1e11c8eace70bc364fb0572af4c00f9c53d1a8fa4702a792ff9a83eef082e90a18dadd9dcbbc808b8887be9f1b74d8bd5de8adfbcd46b7ab3df6ea858bff5a1b4b5d5f85a6df2e90f370f67e9b7b9e9e02f7b5cb615a86297b112bd735d61d66e25624c465d5a87bfc7f7ec3daac70d4abc99c7a12cc79a14e9a7618a86a295c0fd5cbd9f716ad49a35b152828c3a16bdd4b649d0bf6a1c80a500cdde4627b13751d91cb67fd9003ba3a91891f240be702f978e4e55354de192406defe3d84917f02e27855d6611d8ffc41f73ea5abd7b0f48ad277b691a27e5b747a7d8aa632920f3fce2788d4437fc23f59f9a4b4dbe7fa3460c5c4047277a8b02cb508a2c1853d14aa78689c4814b44391bfc4acc022e7119e9109d35225271c063d6d89d09347a8c1d2ab958bad1ac3890de420877b875272db3402a63da014a38c8ddb9568f00c7c29f31d11bcd473dac29c91247d570cc491384ece7f19ce3a3e4b2c8d72bde83120c3c7d38b49fbb640d7842f9f9a86b1ea6915b2121b72e281667bec82aeb7665d5dde31c6bceb7eb14f41f08d71faaf1b8f31f96564a8add5fbdb69045bfba0fbf3a4e1ea032bbbf3babe0de46ca56fd7738562e8c65c7ad1e8ecf3fe810cca9521a345af1d1bab6eac8a35e391bf1787bf16ee6050635188afa2f9b455c44690b2fecf9f40f08a10c7caf00744db2d389f2d618abcf44e5a45348c186fe926d1eb87f7b402735c05ae96544b5ab3367b60bdb4598152cea9f8f2844ca81fd5fd0b87383db0024db1d2b3c7469245793199cb5aba92dafaf2c90a9e1a93841ff78663ca97d8d51deba8cc06f3f5b7a1af71d3b65dfa48c9acd436bf364641db455d6e8e8ed644b30a4dd7806f1ba82f33c856c76e1f28ec3939e1ad0a7d38426e7af4ae49c0aa9e575a13d9d520aa84bd15090c28a142777e0b6a9d5ddd07918e3a20257a6be334196489ee60ba275d0b821d1ff315da51921111905409311b457fef71d2679a271752cd98cd9b0b1f871ec2e1e02525b41587f88a0bbf7bb63e34f8ca3975789c252a0b803518f2c03d327af92f9c2ed4ec9beb301da910331ad8a2d79c2c461362662c47859154ce8a26c9a12bcae161899a4005572dd3191cec8e4db0ab78816455c0a388c78a979c8ebe0593b23a7fd8681555d686507cf215dd4b1ce9ecd49fb7a4e2884f0449e40bf8eb6347f59a268e7a51441890200a4bb9e86aa18c088e5994699657d4d2d518bf83b59adc8220841e7ad807ed7adad95403d2319836d069b15d245ce013867121224e5e74371c32ff8cd9d19cc477ca36b5e0ac7c15041f2fe7f46a91a8c9cd089f4f38a6118f45f1fc9c48eb4820d355a869fecc2b391630b13aeacb2b745b22018d554a2b8d833f404784f1687d554089aedba3d7036788860bf66e8735603e6e2ed2235e8800931fdc30c9eec3d224650c5b58229faaa9cfacc31", 0x5a9}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x200040d0}, 0x4004) sendmsg$tipc(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001}, 0x8000) r2 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pressure(r2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000010c0)='\'\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x2b}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 3.918663689s ago: executing program 4 (id=25518): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xe, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc0a00e9bfde908990817b364e51afe9c81a97f0570759f1cae63487ff68ffffffffff"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x26}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000009000000020000000900000042000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000080000000015e2426b1e41c471000000000000"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x400000000001fd, 0x2080, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x6, 0x1, 0xb92a}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r0, r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x800000}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.961009801s ago: executing program 4 (id=25540): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/175, 0xaf}, {&(0x7f0000001100)=""/35, 0x23}, {&(0x7f0000001140)=""/76, 0x4c}, {&(0x7f00000011c0)=""/234, 0xea}, {&(0x7f00000012c0)=""/183, 0xb7}], 0x6}, 0x1) 2.672354209s ago: executing program 4 (id=25542): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='/proc/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x102d3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x5}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100)=0x1, 0x12) write$cgroup_int(r4, &(0x7f0000000200), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000a00)='blkio.bfq.sectors_recursive\x00', 0xf0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xd490c011, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4800) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 2.668677249s ago: executing program 3 (id=25546): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000000)=@abs, 0x6e, 0x0}, 0x40000000) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp={0x0, 0x8}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="0000000018000000e502004000178338690000009507b590bf1578fe86ff8b0b8d3637da3b731b1ca2603fe1a9552618bae46afed4efe319222e281b2d4cd744c1dad58503"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000c0000004300000040000000c0000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000baf67d13f10000000000000000000001000000000000"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100), &(0x7f00000001c0), 0x10f0, r6}, 0x38) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x118541}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x3) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000440), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x3a) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110c230000) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xc, 0xed}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) ioctl$TUNSETOFFLOAD(r8, 0x4004743c, 0xf0ff1f00000000) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000640), 0x16c5, r6}, 0x38) sendmsg$unix(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000007c0)='\'', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000020000000000000000000000003b000000000000000000"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r10, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYRES64=r9, @ANYRESDEC, @ANYBLOB="00000100000000000080443754e71f9cfbdc0000000000000000000000ea7db62b06f2e2ea05bf88db48bfb774b56ac6d73ebe94bfe2ca1841255bcf7e91caf1f0b4836009a2cbb1b43aa7a98dd0c81f021dc02e6609591cd8a12402844adcd819ef8110ef17072c0128f02a36d8b474a2cc918d2d9d2781ad926bb191f8202ff888593bb870efdda28f05cea2b96b2701baeca7f61f7707214123e0fec26973350d440cdc89f251c7c6fc8f187300be35eea20c5ae4ea394478321dabf8", @ANYRESHEX, @ANYRESHEX=r10, @ANYRES8=r9], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRES8=r5, @ANYRESDEC=r5, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000001340)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x6a, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.03420749s ago: executing program 3 (id=25552): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0xae31cbdd19173c73, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x4e, 0xffffffffffffffff, 0x0, 0x1c000000007400}, 0x38) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf301}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x75}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x242, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'virt_wifi0\x00', 0x1003}) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r1, &(0x7f00000001c0)=ANY=[@ANYRES8=r2, @ANYRES16, @ANYRESOCT=r0, @ANYRESOCT=0x0, @ANYRESDEC=r1], 0xffdd) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.460254627s ago: executing program 0 (id=25558): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x40, 0x0, 0x0, 0x0, 0xd, 0x14, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0xc18, 0x80000000, 0x0, 0x5, 0x6, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x40, 0x0, 0x0, 0x0, 0xd, 0x14, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0xc18, 0x80000000, 0x0, 0x5, 0x6, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) 1.452887517s ago: executing program 0 (id=25561): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x0, 0x0, 0xfffffffe, &(0x7f00000006c0)) sendmsg$tipc(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) sendmsg$sock(r2, &(0x7f0000001640)={&(0x7f0000001040)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000001540)=[{&(0x7f00000010c0)="04f2f7997c8d2d1de9cdbe316065f4b6d344b9fda04b02619b207f12d2973777b627d0cd7081fdcf6aebc033c6b993e248c9f3", 0x33}, {&(0x7f0000001100)="2016d9409ebae6dc0732f0c2993b38dc68a70a684c29baf1cdc5dd5e37db786821bc362ef1cadfdc83fc5098209b0a6c24257be5009265a5b5696661f5c0d259bdfbe621a23a8464b3fae62e26ce97aa56e2076c607639c0536b8b9544fbe8410bb5956088cd9420305451c90e6865cf3bd8fd36ebb39414892bd9eedc10a2154b84644c1aba20772149d8a00b7ae844004705c67728ec573ea1a272e5124221bc", 0xa1}, {&(0x7f00000011c0)="3c53bd6fc12fe978b899b51add7a74cd0fefdec43511a7dd04560a267baa8aad3bb5e9db95895fe0c29a3728a5def811c1a3c1aade7a597aed7c329cf6632200798457c15877c25566d2b5696041f3e986bd6cb12350e82e121e5a17e23a716669aaabea6d7b75179431fe5164d0cec1c650c31637cc178d12b3aa", 0x7b}, {&(0x7f0000001240)="172eac8f1ea1f17704455120a680aa9281c27e67fad45cc84032fd7fa39ad9a8ec15f5835a1ab8f953d8ddd3ba74ac78845c3fb5622b285de3bb89fbe2a41a28c67b571178c59e9c8aa962230b5e77a577dc0044e3e07df8b244bae005d8d4f36b7fae6aa5a58847e8e25e504e5ac7011fefa5d0a9a67f0eae6e3d6fe3327cffca322ad1d9f37a382a73510d7c66483ee2c134503b170179719fc40609805ac473bae697176b6c3076db02213b99bf443e042c594c6a3b61c7e56a7dc2b9d591f9b6f8fef068095793cdeb4229fd9c99fae695fdd50669bf9fc94a3a8117a99dc2620a2645ec8c0eb3f055723ccd", 0xee}, {&(0x7f0000001340)="74957158cd2a68e9cd6509fec31a466b467307375a493bbf0f278e41d882adbbd55f0cf41257c5bbbe42f26ba9e246b300d550fe314b13ef10ff6d", 0x3b}, {&(0x7f0000001380)="4493ad48bb3cedfc01c2467b8a74da8b86b922162592695d18207cf7c1d84a4b249012a51202458b7bfbc285db8c2c1aaed469a6e02066dccd90d2dfc54c29fd4fd96c12140f5b0eefa8dda331a90b55ae23c12a2a345da0653cd53dd4193a15846c2ba963922c5f05cd", 0x6a}, {&(0x7f0000001400)="4f881cdd9e6a8ec9716c6c5243800829d5445957fa5f6e7baba096461e53eba536861d239058bf4dd16eb41401d26053c1c301db5870dee5552e", 0x3a}, {&(0x7f0000001440)="78e02d63e6b21615373a536c963553375763ff545e921e6bd152e8eb7bfe34ecb7465f98b877355f76297e4ced568a49ac679c32a4a113572ce934b215d5a3b6ac8b592a383ca5ad345ab7ce4c8a1a1a2290f75cccead52f39bd410122823342022e5985e2dadbaafc57f4a6aa69721857777adbd9ab59488073d93cc93675a63230a1269c3963523da1c3b3f4bd8fc14ce22c5b36bf9b7152d1a1b47c2e1c008e52826026d2e964ceef6c2ec85461c785b15ea55684d90a62778d555dba8421c6d020793362dbffc4", 0xc9}], 0x8, &(0x7f00000015c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x25d}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14}}], 0x60}, 0x0) sendmsg$tipc(r0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20061, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0}, 0x10000, 0x100, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x3) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x180}, {}, {0x7, 0x0, 0xb, 0x9}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000003000), 0x201, 0x0) openat$cgroup_subtree(r6, &(0x7f0000001000), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x74}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x10, 0x0, 0x5, &(0x7f0000001800)) 1.083970241s ago: executing program 3 (id=25566): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38f0ff10ff"], 0x0, 0x42, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57bea000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r4}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xffc0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38f0ff10ff"], 0x0, 0x42, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) recvmsg$unix(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57bea000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r4}, 0x94) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xffc0) (async) 1.033677734s ago: executing program 3 (id=25568): r0 = perf_event_open$cgroup(&(0x7f0000000600)={0x3, 0x80, 0x5, 0x81, 0x7d, 0x5, 0x0, 0x0, 0x68020, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x10200, 0xffff, 0x1, 0x9, 0x2000000000, 0x8, 0x80, 0x0, 0x7, 0x0, 0xfffffffffffff8af}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xffffffff, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="12000000040000000400000008"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0xc0189436, &(0x7f00000020c0)=""/4109) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000280)={0xa, &(0x7f0000000500)=[{0x4, 0xf8, 0x81, 0x3ff}, {0x6, 0x8, 0x2, 0x1}, {0x100, 0x7, 0x7f, 0x3}, {0x1, 0x2, 0xcd, 0x12}, {0xfe01, 0xbe, 0x8b, 0xfffffffa}, {0x5, 0x0, 0xfd, 0x7}, {0x1, 0x33, 0x81}, {0xfffa, 0x7, 0x0, 0x7}, {0x9, 0xa, 0x10, 0x19dd}, {0x65, 0x9, 0x7, 0xea}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4002000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) syz_open_procfs$namespace(0x0, 0x0) (async) ioctl$TUNSETVNETLE(r5, 0x400454dc, &(0x7f00000003c0)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="09000000040000009c00000040"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r8}, 0x38) (async) socketpair(0x1e, 0x3, 0xfffffffa, &(0x7f00000001c0)) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r8, &(0x7f0000000600), &(0x7f0000000580)=""/95}, 0x20) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x8) 962.069939ms ago: executing program 6 (id=25570): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000d3ec66ecc053c543da5f5f"], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2020) (async, rerun: 64) close(r3) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xd, 0x4, 0x4, 0x7, 0x0, r4, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r6, &(0x7f0000000080), 0x0}, 0x20) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) (async) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x541981, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000280)={'syzkaller0\x00', @broadcast}) 948.497529ms ago: executing program 6 (id=25571): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) close(0xffffffffffffffff) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x6, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000008a000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) 874.334914ms ago: executing program 6 (id=25572): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x58, 0x0, 0x400, 0xf6103, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x2, @perf_bp={0x0, 0x8}, 0x420, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x4, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa105000000000000000000f8ffffffb702000008000000b7030000000000008500000006000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x1, 0x0, r1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)}, 0x10020) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700000004000000000900f40410000028"], 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x121942, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x4, [@var={0x3, 0x0, 0x0, 0xe, 0xf9, 0x1}, @var={0xe, 0x0, 0x0, 0xe, 0x3, 0x2}, @enum={0x9, 0x1, 0x0, 0x6, 0x4, [{0xb}]}, @restrict={0x5, 0x0, 0x0, 0xb, 0x1}, @enum={0xc, 0x4, 0x0, 0x6, 0x4, [{0x3, 0x401}, {0xf}, {0x7, 0x8000}, {0x6, 0x3}]}, @volatile={0x8, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0xa83b8c384faa0af4, 0x0]}}, &(0x7f0000000340)=""/187, 0x94, 0xbb, 0x0, 0x9}, 0x28) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x9, 0x9, 0x1, 0x7, 0x29000, 0xffffffffffffffff, 0x807d, '\x00', 0x0, r4, 0x4, 0x4, 0x3, 0x0, @value=r5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x0, 0x0, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(r3, &(0x7f0000000700)=ANY=[@ANYBLOB="7c1292442b01"], 0xfe3a) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r6) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 633.399859ms ago: executing program 3 (id=25573): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x51) 623.39846ms ago: executing program 6 (id=25574): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000005000000020017000700000041"], 0x2a) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), 0x0, 0x75, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000600)={r0, &(0x7f0000000500)="808d097d2a0da740130ee8bc7e14ff045af7137c7c856b88a5e089a0fd555a702b8076edb9e398bb4104b00c027c2db5ae3ba924adc83652fc85c959d5e28e85dab73f1526e89afc95f61423b0832ea660bf3272375a7c9a5ae4c691dddfaba0e10d0f1c104a4e24b8f625fdec", &(0x7f0000000580)=""/71}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x51, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x73, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES16=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x4e}, 0x28) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 585.952483ms ago: executing program 0 (id=25575): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000005000000020017000700000041"], 0x2a) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), 0x0, 0x75, r0}, 0x38) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) syz_clone(0x0, &(0x7f0000000500)="562659298c0d6d9a7c", 0x9, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x3, 0x0, 0x7, 0xc, 0x7602, 0x0, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffe, 0x4, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 477.62802ms ago: executing program 4 (id=25577): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f00, 0xe, 0x0, &(0x7f0000000040)="9f44948721919580684010a49e66", 0x0, 0x7ff, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x50) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r0}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000b60100007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000013da0000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r5, r4}, 0xc) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffff3a, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x50) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x9, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="620ac4ff0000000071101b00000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x15, 0x5, 0x4, 0x2c7, 0x201, 0xffffffffffffffff, 0x208, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000009c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000940), &(0x7f0000000980)=r0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a80)={{0x1, 0xffffffffffffffff}, &(0x7f0000000a00), &(0x7f0000000a40)='%pS \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x15, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2ab9}, [@exit, @alu={0x7, 0x1, 0x2, 0x8, 0xb, 0x30, 0x8}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}]}, &(0x7f00000002c0)='syzkaller\x00', 0x80000001, 0x30, &(0x7f0000000300)=""/48, 0x40f00, 0x4, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000ac0)=[r6, r7, r8, r9, 0xffffffffffffffff, r10], &(0x7f0000000b00)=[{0x1, 0x5, 0x2, 0xb}, {0x1, 0x2, 0x7, 0xa}], 0x10, 0x5}, 0x94) 440.454222ms ago: executing program 4 (id=25578): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="61154c000000000061138c0000000000bfa00000000000001503000008004e002d35010000000000950041000000000069163a0000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ff3d4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2739670b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc401000000cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be19637302f3b41eae50509fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524a3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18402cde8b0100010000000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d545ffffffff00000000a1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf857689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684ee54c0a263c806aabac2f66cb052f847c62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961ef4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fc0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bb000000000000000000000000000000884efcecca45ea4ab2ec097668456a6ff12854997f5aed737d5205ace5c0b64f87ef10784d0479cb44ca077e0c4ce6ff880e2ce3de63853a9740e9233683bfc8636bee293aeeb680b399a296e6f44c07b5fc5d9d359af007f23004a7acb6df23664ea209620b4fe0f4df81c33bd8ca2335cb4b50881937379b45a301175c3e8eb32970564ec8e25c46ee3bae079faedaad94276cfa251be8256c4c37fc84a25c3a2feb39e94a5266a10716d4a3cef499fa176018054e9149a1c9d20a809ce3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000c00000004000000010000840203000000000000030000000000000000000000000000010500000020000000000000000000000b02000000006100302e"], 0x0, 0x58}, 0x28) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c23003f) write$cgroup_devices(r0, 0x0, 0xa) syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x3, 0x5, 0x100, 0x81, 0x4, 0x1, 0xfffffffa, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x50) 432.152373ms ago: executing program 3 (id=25579): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x9}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010000}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 430.817903ms ago: executing program 2 (id=25580): bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pimreg\x00', 0x5dcf70ef8daa5d0e}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f0000000340)=[{0x4c, 0x0, 0x0, 0x2}, {0x6}]}) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000040), 0x4) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000001040)={'veth1_macvtap\x00', @link_local}) (async, rerun: 64) r6 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) (rerun: 64) write$cgroup_subtree(r6, &(0x7f0000000a00)=ANY=[@ANYBLOB='1-2:', @ANYRESOCT, @ANYBLOB='B'], 0x31) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r7) (async, rerun: 32) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 326.154159ms ago: executing program 0 (id=25581): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x33}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) (async) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0xa2f7, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000080180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYBLOB="000000ffffffffffffffe680"], 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 324.889499ms ago: executing program 2 (id=25582): ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000000)) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x101103, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'pim6reg0\x00', 0x200}) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)) (async) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000100)=0x6) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x100, 0xe, 0x72, 0x1}]}) (async) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000001c0)) (async) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)={'bridge_slave_0\x00'}) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) (async) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000280)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000300), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000380)=""/199, 0xc7}, {&(0x7f0000000480)=""/116, 0x74}, {&(0x7f0000000500)=""/220, 0xdc}], 0x3, &(0x7f0000000640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000700)=@generic={&(0x7f00000006c0)='./file0\x00', r3}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740), 0xb0820, 0x0) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) (async) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x8, '\x00', 0x0, r2, 0x0, 0x2}, 0x50) close(r5) (async) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000800)={r2}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r2}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b40), &(0x7f0000000b80)='%pi6 \x00'}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x1e, 0x1a, &(0x7f0000000900)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x2}, @cb_func={0x18, 0x9}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffb}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x7, 0x0, 0xd, 0x0, 0xa, 0x1, 0xfffffffffffffffc}], &(0x7f0000000a00)='syzkaller\x00', 0x40, 0x8a, &(0x7f0000000a40)=""/138, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x37, r3, 0x8, &(0x7f0000000b00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000c00)=[r8], &(0x7f0000000c40)=[{0x1, 0x2, 0x7, 0x2}, {0x5, 0x1, 0x10, 0x9}, {0x0, 0x3, 0x2, 0x2}, {0x3, 0x4, 0x7, 0x1}, {0x0, 0x5, 0xd, 0xc}]}, 0x94) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d80)='./cgroup.net/syz1\x00', 0x1ff) bpf$LINK_DETACH(0x22, &(0x7f0000000dc0)=r5, 0x4) (async) write$cgroup_subtree(r6, &(0x7f0000000e00)={[{0x2d, 'perf_event'}, {0x0, 'rlimit'}, {0x2b, 'pids'}, {0x2d, 'net_prio'}, {0x2d, 'cpu'}, {0x2b, 'net_cls'}, {0x2d, 'rlimit'}, {0x2d, 'net_prio'}]}, 0x44) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e80)) (async) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) (async) openat$cgroup_int(r3, &(0x7f0000000ec0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) mkdir(&(0x7f0000000f00)='./file0\x00', 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000002040)={0x9, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002100)={0x17, 0xa, &(0x7f0000000f40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0x14}, @initr0={0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x5e34}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit]}, &(0x7f0000000fc0)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000001000)=""/4096, 0x41000, 0x4, '\x00', 0x0, @cgroup_sysctl=0x12, r3, 0x8, &(0x7f0000002000)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, r10, r9, 0x1, &(0x7f0000002080)=[0xffffffffffffffff, r8], &(0x7f00000020c0)=[{0x1, 0x3, 0xe, 0x2}], 0x10, 0xbff}, 0x94) 323.86239ms ago: executing program 6 (id=25583): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000ec0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300001fffffff850000002d000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000001100)='cpu&00\t&&') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r1}, 0xc) r3 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb001800000000000000280000002800000002000000000000000000000105000000100000000000000001000085106555c6cd3f32ef0100000000000008000078c8aa1000"], 0x0, 0x42}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000500)={0x3, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x4, 0xa2143, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x4, 0x8, 0x8000000000000000, 0x0, 0xfff, 0x0, 0x4}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x84, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x9, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0xd, 0x0, r0, 0xfb, '\x00', r4, r5, 0x3, 0x1, 0x4}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r6, 0x0, 0x0}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63ec0000000000000000c9e8b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 300.112991ms ago: executing program 2 (id=25584): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000ff0f000000000000000000001801000020207025"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x2, 0x8, 0x40, 0x42, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r0}, 0x38) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000600), &(0x7f0000000580)=""/95}, 0x20) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x1fff, &(0x7f00000004c0), 0x2}, 0x80) (async, rerun: 64) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) (rerun: 64) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'vlan1\x00', 0x400}) 288.692882ms ago: executing program 2 (id=25585): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000071180a000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x45, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 229.938306ms ago: executing program 0 (id=25586): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r0, 0x80047456, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x34}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x2c}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) 228.455936ms ago: executing program 6 (id=25587): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xb9, 0x0, 0xf, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x490d, 0x0, @perf_config_ext={0x5, 0x7}, 0x410, 0x2000000, 0xfffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={&(0x7f0000001400)=""/4096, 0x1000, 0x0, &(0x7f0000000000)=""/61, 0x3d}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x15, 0x4, &(0x7f00000005c0)=ANY=[@ANYRESHEX=r1], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x3, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x0, 0x0, 0xfffffffe, &(0x7f00000006c0)) sendmsg$tipc(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) sendmsg$tipc(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20061, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0}, 0x10000, 0x100, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x8, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000340)="b9ff03316844268cb8ed08fa3add", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdir(&(0x7f0000000000)='./file0\x00', 0x1e5) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000003000), 0x201, 0x0) openat$cgroup_subtree(r6, &(0x7f0000001000), 0x2, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 227.892806ms ago: executing program 2 (id=25588): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd}, {0x85, 0x0, 0x0, 0x2d}}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f3, &(0x7f0000000080)) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r1}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f40)={r1, 0xe0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000a00), &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x78, &(0x7f0000000d40), 0x0, 0x10, &(0x7f0000000d80), &(0x7f0000000dc0), 0x8, 0xce, 0x8, 0x8, &(0x7f0000000e00)}}, 0x10) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000f80)={0x0, r0}, 0x8) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f0000000840), 0x2, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x13, 0x1fffffffffffffcd, &(0x7f00000009c0)=ANY=[@ANYRESOCT=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, &(0x7f0000000540)=""/153}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26}, 0x20) ioctl$TUNSETQUEUE(r7, 0x5450, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x11, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000002000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000181a0000", @ANYRES32=r0, @ANYBLOB="0000000000230000bf91000068000000b701ffffe90000008500000084000001b7000000000000009000000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r8, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x57, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x86, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8922, &(0x7f0000000000)={'bridge_slave_0\x00', @random="442200001000"}) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300bc08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x1c, 0x17, &(0x7f0000001080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x1339}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx_val={0x18, 0x0, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x3}, @tail_call, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001140)='GPL\x00', 0x8, 0xd3, &(0x7f0000001180)=""/211, 0x41000, 0x1, '\x00', r9, 0x0, r7, 0x8, &(0x7f0000001280)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000012c0)={0x3, 0x2, 0x7, 0xff}, 0x10, 0x18b7b, r5, 0x2, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001400)=[{0x5, 0x3, 0x8, 0x5}, {0x1, 0x4, 0x1, 0x6}], 0x10, 0x2}, 0x94) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x10004, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000640), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a}, 0x28) (async) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@ptr={0x4}, @float={0x5, 0x0, 0x0, 0x10, 0x4}]}, {0x0, [0x2e, 0x61]}}, &(0x7f0000000c00)=""/231, 0x34, 0xe7, 0x1, 0x3, 0x10000}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', r9, r11, 0x5, 0x4}, 0x50) 20.327519ms ago: executing program 0 (id=25589): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xb5}}, &(0x7f0000000480)='GPL\x00'}, 0x80) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000016000000b40000007f"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000cc0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x5}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f00000004c0), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000700)={'veth1_macvtap\x00', @random}) perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x18) 0s ago: executing program 2 (id=25590): bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a}, [@call={0x85, 0x0, 0x0, 0x28}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) (async) r0 = syz_clone(0x473ac34275ca2208, &(0x7f0000000200)="a850fab4c481a4c753ab6e3afc71b109d6b0f4516a23", 0x16, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="f45aa1cd") (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)=ANY=[@ANYRES32=r1, @ANYRES32, @ANYBLOB="1f00"], 0x10) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x81, 0x6, 0x5, 0x6, 0x0, 0x5, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x102822, 0x4, 0x9, 0x8, 0x80000001, 0x7ff, 0x2d4b, 0x0, 0x400, 0x0, 0x4}, r0, 0xd, r2, 0xa) kernel console output (not intermixed with test programs): device veth1_macvtap left promiscuous mode [ 853.402038][T15222] device pimreg0 entered promiscuous mode [ 855.215422][T15288] device syzkaller0 entered promiscuous mode [ 856.976484][T15420] sock: sock_set_timeout: `syz.2.13845' (pid 15420) tries to set negative timeout [ 858.068990][T15498] pimreg1: tun_chr_ioctl cmd 1074025692 [ 858.765450][T15539] device sit0 entered promiscuous mode [ 859.469274][T15561] device syzkaller0 entered promiscuous mode [ 860.390667][T15624] device pim6reg1 entered promiscuous mode [ 861.773359][T15718] syzkaller0: mtu greater than device maximum [ 861.884871][T15723] device syzkaller0 entered promiscuous mode [ 862.155122][T15752] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 862.161239][T15752] syzkaller0: linktype set to 773 [ 862.255714][T15768] device syzkaller0 entered promiscuous mode [ 864.240305][T15805] batadv0: tun_chr_ioctl cmd 1074812118 [ 866.589550][T15935] device syzkaller0 entered promiscuous mode [ 867.402115][T15985] device syzkaller0 entered promiscuous mode [ 868.371448][T16020] device syzkaller0 entered promiscuous mode [ 868.645755][T16059] : renamed from vlan1 [ 870.063728][T16199] device syzkaller0 entered promiscuous mode [ 870.105855][T16200] device syzkaller0 entered promiscuous mode [ 870.294997][T16211] bridge0: port 4(veth0_to_team) entered blocking state [ 870.361878][T16211] bridge0: port 4(veth0_to_team) entered disabled state [ 870.380670][T16211] device veth0_to_team entered promiscuous mode [ 870.407346][T16214] : renamed from bond_slave_0 [ 870.630631][T16227] device veth1_macvtap entered promiscuous mode [ 870.657902][T16227] device macsec0 entered promiscuous mode [ 870.687182][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 870.789036][T16225] device wg2 entered promiscuous mode [ 871.542844][T16266] device bridge0 entered promiscuous mode [ 873.846374][T16361] device syzkaller0 entered promiscuous mode [ 874.274816][T16381] device sit0 left promiscuous mode [ 874.409909][T16384] device syzkaller0 entered promiscuous mode [ 874.495866][T16381] device sit0 entered promiscuous mode [ 875.611781][T16474] tap0: tun_chr_ioctl cmd 1074025677 [ 875.648832][T16474] tap0: linktype set to 768 [ 876.057186][T16511] device syzkaller0 entered promiscuous mode [ 877.297997][T16588] device syzkaller0 entered promiscuous mode [ 877.700100][T16614] device syzkaller0 entered promiscuous mode [ 877.925480][T16616] device veth0_vlan left promiscuous mode [ 877.938565][T16616] device veth0_vlan entered promiscuous mode [ 877.988960][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 878.002823][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 878.030953][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 880.679319][T16776] device dummy0 entered promiscuous mode [ 880.917939][T16781] device syzkaller0 entered promiscuous mode [ 884.107174][T16891] device syzkaller0 entered promiscuous mode [ 884.387139][T16901] device veth1_macvtap left promiscuous mode [ 884.782627][T16912] device syzkaller0 entered promiscuous mode [ 886.669370][T17011] device syzkaller0 entered promiscuous mode [ 887.099166][T17063] device syzkaller0 entered promiscuous mode [ 888.501238][T17116] IPv6: : Disabled Multicast RS [ 889.478261][T17173] ip6tnl0: mtu greater than device maximum [ 889.648323][T17184] device syzkaller0 entered promiscuous mode [ 890.349518][T17197] tap0: tun_chr_ioctl cmd 2147767506 [ 891.283997][T17270] tap0: tun_chr_ioctl cmd 2147767521 [ 893.128238][T17411] : port 1(ip6gretap0) entered blocking state [ 893.144400][T17411] : port 1(ip6gretap0) entered disabled state [ 893.156650][T17411] device ip6gretap0 entered promiscuous mode [ 893.296263][T17424] device sit0 entered promiscuous mode [ 893.403216][T17428] device dummy0 left promiscuous mode [ 894.554320][T17511] bridge0: port 1(bridge_slave_0) entered disabled state [ 894.687507][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 894.716454][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 894.723533][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 895.427927][T17554] device syzkaller0 entered promiscuous mode [ 895.456190][T17554] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 896.421622][T17602] device veth0_vlan left promiscuous mode [ 896.435103][T17602] device veth0_vlan entered promiscuous mode [ 896.484798][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 896.493422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 896.501294][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 898.845036][T17674] device vlan0 entered promiscuous mode [ 899.514846][T17716] lo: mtu less than device minimum [ 902.555087][T17892] batadv0: tun_chr_ioctl cmd 1074025677 [ 902.571218][T17892] batadv0: linktype set to 823 [ 902.577402][T17892] batadv0: tun_chr_ioctl cmd 2147767511 [ 902.608387][T17892] batadv0: tun_chr_ioctl cmd 2147767511 [ 903.210353][T17928] device syzkaller0 entered promiscuous mode [ 903.918298][T17963] device syzkaller0 entered promiscuous mode [ 906.541529][T18158] device syzkaller0 entered promiscuous mode [ 906.905007][T18177] device syzkaller0 entered promiscuous mode [ 907.102295][T18194] device syzkaller0 entered promiscuous mode [ 907.149199][T18196] device syzkaller0 entered promiscuous mode [ 907.451405][T18229] device syzkaller0 entered promiscuous mode [ 909.111073][T18346] device syzkaller0 entered promiscuous mode [ 909.915420][T18391] device syzkaller0 entered promiscuous mode [ 909.963466][T18398] device ip6gretap0 left promiscuous mode [ 909.976165][T18398] : port 1(ip6gretap0) entered disabled state [ 910.007722][T18391] tap0: tun_chr_ioctl cmd 1074025692 [ 910.948277][T18455] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 910.954149][T18455] syzkaller0: linktype set to 825 [ 912.239910][T18500] device wg2 left promiscuous mode [ 913.218273][T18560] device syzkaller0 entered promiscuous mode [ 913.351027][T18562] device syzkaller0 entered promiscuous mode [ 913.646317][T18580] device wg2 left promiscuous mode [ 914.344519][T18610] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 915.107272][T18644] device wg2 entered promiscuous mode [ 915.821875][T18686] device syzkaller0 entered promiscuous mode [ 916.282993][T18703] : renamed from vlan0 [ 917.261293][T18741] bridge0: port 1(bridge_slave_0) entered blocking state [ 917.290089][T18741] bridge0: port 1(bridge_slave_0) entered disabled state [ 917.298466][T18741] device bridge_slave_0 entered promiscuous mode [ 917.416052][T18741] bridge0: port 2(bridge_slave_1) entered blocking state [ 917.425232][T18741] bridge0: port 2(bridge_slave_1) entered disabled state [ 917.443915][T18741] device bridge_slave_1 entered promiscuous mode [ 917.636602][T18741] bridge0: port 2(bridge_slave_1) entered blocking state [ 917.643689][T18741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 917.650995][T18741] bridge0: port 1(bridge_slave_0) entered blocking state [ 917.658054][T18741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 917.850848][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 917.866658][T18567] bridge0: port 2(bridge_slave_1) entered disabled state [ 917.916645][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 917.932287][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 918.072795][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 918.124036][T18567] bridge0: port 2(bridge_slave_1) entered blocking state [ 918.131216][T18567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 918.219328][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 918.234606][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 918.264126][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 918.281461][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 918.310321][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 918.390677][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 918.441843][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 918.453786][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 918.470567][T18741] device veth0_vlan entered promiscuous mode [ 918.543220][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 918.572739][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 918.608805][T18741] device veth1_macvtap entered promiscuous mode [ 918.619647][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 918.627487][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 918.635689][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 918.664176][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 918.697558][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 918.832019][T18786] device syzkaller0 entered promiscuous mode [ 919.902909][ T306] device veth1_macvtap left promiscuous mode [ 920.426693][T18873] device syzkaller0 entered promiscuous mode [ 921.767101][T18932] GPL: port 1(erspan0) entered blocking state [ 921.826299][T18932] GPL: port 1(erspan0) entered disabled state [ 921.875753][T18932] device erspan0 entered promiscuous mode [ 922.777688][T19007] syz.3.14918[19007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 922.777752][T19007] syz.3.14918[19007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.066646][T19025] device veth1_macvtap left promiscuous mode [ 923.528867][ C1] Illegal XDP return value 16128, expect packet loss! [ 924.271780][T19139] device pim6reg1 entered promiscuous mode [ 924.572190][T19152] device syzkaller0 entered promiscuous mode [ 924.644401][T19164] device syzkaller0 entered promiscuous mode [ 924.713232][T19171] : renamed from veth0_vlan [ 926.235771][T19208] device syzkaller0 entered promiscuous mode [ 926.597361][T19228] device syzkaller0 entered promiscuous mode [ 926.686360][T19233] bridge0: port 3(syz_tun) entered blocking state [ 926.733664][T19233] bridge0: port 3(syz_tun) entered disabled state [ 926.754003][T19233] device syz_tun entered promiscuous mode [ 926.787398][T19233] bridge0: port 3(syz_tun) entered blocking state [ 926.793845][T19233] bridge0: port 3(syz_tun) entered forwarding state [ 926.916628][T19247] : port 1() entered blocking state [ 926.927059][T19247] : port 1() entered disabled state [ 926.941911][T19247] device entered promiscuous mode [ 927.915852][T19292] device syzkaller0 entered promiscuous mode [ 928.021447][T19297] device syzkaller0 entered promiscuous mode [ 928.158986][T19317] device syzkaller0 entered promiscuous mode [ 928.179808][T19319] device syzkaller0 entered promiscuous mode [ 928.193522][T19319] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 928.769805][T19347] syz.2.15017[19347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 928.769909][T19347] syz.2.15017[19347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 930.629979][T19446] : port 1(ip6gretap0) entered blocking state [ 930.686099][T19446] : port 1(ip6gretap0) entered disabled state [ 930.692770][T19446] device ip6gretap0 entered promiscuous mode [ 931.418972][T19464] device syzkaller0 entered promiscuous mode [ 932.196378][T19488] device syzkaller0 entered promiscuous mode [ 932.891202][T19516] device syzkaller0 entered promiscuous mode [ 933.007155][T19543] ref_ctr_offset mismatch. inode: 0x880 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 933.678944][T19564] device syzkaller0 entered promiscuous mode [ 933.699647][T19566] bridge0: port 2(bridge_slave_1) entered disabled state [ 933.706865][T19566] bridge0: port 1(bridge_slave_0) entered disabled state [ 933.718284][T19566] device bridge0 left promiscuous mode [ 933.935153][T19566] bridge0: port 2(bridge_slave_1) entered blocking state [ 933.942324][T19566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 933.950963][T19566] bridge0: port 1(bridge_slave_0) entered blocking state [ 933.958274][T19566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 933.978908][T19566] device bridge0 entered promiscuous mode [ 935.249706][T19632] batadv0: tun_chr_ioctl cmd 1074025677 [ 935.255392][T19632] batadv0: linktype set to 776 [ 936.774235][T19691] device syzkaller0 entered promiscuous mode [ 936.810327][T19690] device syzkaller0 entered promiscuous mode [ 936.826733][T19690] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 939.125672][T19785] bridge0: port 4(veth0_to_team) entered blocking state [ 939.176367][T19785] bridge0: port 4(veth0_to_team) entered disabled state [ 939.184064][T19785] device veth0_to_team entered promiscuous mode [ 939.733021][T19843] device syzkaller0 entered promiscuous mode [ 939.860795][T19866] device syzkaller0 entered promiscuous mode [ 940.923149][T19933] device syzkaller0 entered promiscuous mode [ 942.332772][T20014] device sit0 left promiscuous mode [ 942.389588][T20014] device sit0 entered promiscuous mode [ 943.343666][T20053] tap0: tun_chr_ioctl cmd 1074025677 [ 943.350064][T20053] tap0: linktype set to 774 [ 943.769884][T20103] tun0: tun_chr_ioctl cmd 1074025678 [ 943.777398][T20103] tun0: group set to 1 [ 944.203009][T20130] device syzkaller0 entered promiscuous mode [ 944.318461][T20139] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 944.343777][T20139] device syzkaller0 entered promiscuous mode [ 945.067386][T20201] device syzkaller0 entered promiscuous mode [ 946.050485][T20288] device syzkaller0 entered promiscuous mode [ 946.330488][T20312] bridge0: port 3(gretap0) entered blocking state [ 946.377153][T20312] bridge0: port 3(gretap0) entered disabled state [ 946.448327][T20312] device gretap0 entered promiscuous mode [ 946.471770][T20312] bridge0: port 3(gretap0) entered blocking state [ 946.478299][T20312] bridge0: port 3(gretap0) entered forwarding state [ 946.530534][T20322] tap0: tun_chr_ioctl cmd 1074025677 [ 946.535888][T20322] tap0: linktype set to 270 [ 946.916108][T20352] : renamed from bond_slave_0 [ 947.544726][T20386] device syzkaller0 entered promiscuous mode [ 947.681744][T20393] bridge0: port 4(veth0_to_team) entered blocking state [ 947.756147][T20393] bridge0: port 4(veth0_to_team) entered disabled state [ 947.786523][T20393] device veth0_to_team entered promiscuous mode [ 949.195243][T20448] : renamed from vlan1 [ 951.095397][T20530] device syzkaller0 entered promiscuous mode [ 952.025064][T20587] device pim6reg1 entered promiscuous mode [ 952.545044][T20603] @0: renamed from bond_slave_1 [ 954.971016][T20706] device syzkaller0 entered promiscuous mode [ 955.037729][T20706] syzkaller0: tun_net_xmit 1280 [ 955.508155][T20724] device veth1_macvtap entered promiscuous mode [ 955.559009][T20724] device macsec0 entered promiscuous mode [ 955.676249][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 957.298455][T20858] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 957.304520][T20858] syzkaller0: linktype set to 0 [ 957.407794][T20856] device sit0 left promiscuous mode [ 957.607878][T20859] device sit0 entered promiscuous mode [ 958.467026][T20906] bridge0: port 1(bridge_slave_0) entered blocking state [ 958.477257][T20906] bridge0: port 1(bridge_slave_0) entered disabled state [ 958.484824][T20906] device bridge_slave_0 entered promiscuous mode [ 958.520013][T20906] bridge0: port 2(bridge_slave_1) entered blocking state [ 958.527856][T20906] bridge0: port 2(bridge_slave_1) entered disabled state [ 958.535645][T20906] device bridge_slave_1 entered promiscuous mode [ 958.954841][T20906] bridge0: port 2(bridge_slave_1) entered blocking state [ 958.961941][T20906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 958.969249][T20906] bridge0: port 1(bridge_slave_0) entered blocking state [ 958.976403][T20906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 958.987991][T20953] syz.3.15478[20953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 959.276904][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 959.298757][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 959.307007][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 959.327671][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 959.336394][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 959.343464][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 959.352726][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 959.365755][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 959.372993][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 959.381182][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 959.390181][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 959.414190][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 959.422791][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 959.440969][T20906] device veth0_vlan entered promiscuous mode [ 959.451224][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 959.501426][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 959.554120][T20906] device veth1_macvtap entered promiscuous mode [ 959.561589][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 959.573083][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 959.580983][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 959.592354][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 959.606417][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 959.669784][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 959.681111][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 959.690532][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 959.699245][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 959.724792][T21004] device pim6reg1 entered promiscuous mode [ 960.164259][T18452] device erspan0 left promiscuous mode [ 960.180530][T18452] GPL: port 1(erspan0) entered disabled state [ 960.286541][T21067] syz.2.15508[21067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 960.286607][T21067] syz.2.15508[21067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 960.962706][T18452] device left promiscuous mode [ 961.035359][T18452] : port 1() entered disabled state [ 961.075096][T18452] device veth1_macvtap left promiscuous mode [ 962.024698][T21115] device syzkaller0 entered promiscuous mode [ 963.373925][T21170] device syzkaller0 entered promiscuous mode [ 963.435949][T21172] bridge0: port 3(veth1) entered blocking state [ 963.451294][T21172] bridge0: port 3(veth1) entered disabled state [ 963.472465][T21172] device veth1 entered promiscuous mode [ 963.484833][T21172] bridge0: port 3(veth1) entered blocking state [ 963.491171][T21172] bridge0: port 3(veth1) entered forwarding state [ 963.578355][T21181] device syzkaller0 entered promiscuous mode [ 964.704646][T21228] device syzkaller0 entered promiscuous mode [ 964.818883][T21235] tun0: tun_chr_ioctl cmd 1074025678 [ 964.824303][T21235] tun0: group set to 1 [ 965.439245][T21268] syz.2.15568[21268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.439308][T21268] syz.2.15568[21268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.828656][T21277] device syzkaller0 entered promiscuous mode [ 966.224768][T21313] pimreg1: tun_chr_ioctl cmd 1074025692 [ 967.851579][T21414] device syzkaller0 entered promiscuous mode [ 968.053135][T21437] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 968.287714][T21458] device syzkaller0 entered promiscuous mode [ 968.293957][T21458] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 968.685865][T21477] syzkaller0: tun_chr_ioctl cmd 35108 [ 971.402862][T21660] device bond_slave_1 entered promiscuous mode [ 971.442040][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 971.459694][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 973.180731][T21786] device syzkaller0 entered promiscuous mode [ 973.229948][T21791] device syzkaller0 entered promiscuous mode [ 973.281374][T21797] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 973.331946][T21797] syzkaller1: tun_chr_ioctl cmd 1074025675 [ 973.338602][T21797] syzkaller1: persist disabled [ 973.355693][T21800] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 973.597280][T21831] tun0: tun_chr_ioctl cmd 1074025678 [ 973.602719][T21831] tun0: group set to 1 [ 974.780244][T21872] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 974.786284][T21872] syzkaller0: linktype set to 773 [ 977.886539][T22049] device syzkaller0 entered promiscuous mode [ 978.088885][T22074] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 978.094828][T22074] syzkaller0: linktype set to 773 [ 979.411831][T22136] device syzkaller0 entered promiscuous mode [ 979.751308][T22149] bridge0: port 1(bridge_slave_0) entered blocking state [ 979.758492][T22149] bridge0: port 1(bridge_slave_0) entered disabled state [ 979.765885][T22149] device bridge_slave_0 entered promiscuous mode [ 979.774425][T22149] bridge0: port 2(bridge_slave_1) entered blocking state [ 979.781557][T22149] bridge0: port 2(bridge_slave_1) entered disabled state [ 979.789201][T22149] device bridge_slave_1 entered promiscuous mode [ 979.844357][T22149] bridge0: port 2(bridge_slave_1) entered blocking state [ 979.851469][T22149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 979.858857][T22149] bridge0: port 1(bridge_slave_0) entered blocking state [ 979.865898][T22149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 979.893882][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 979.902945][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 979.910473][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 979.935265][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 979.945731][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 979.952819][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 979.962343][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 979.970726][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 979.977894][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 979.998241][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 980.006421][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 980.033438][T22167] device syzkaller0 entered promiscuous mode [ 980.041991][T22149] device veth0_vlan entered promiscuous mode [ 980.048796][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 980.056866][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 980.064318][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 980.072274][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 980.097124][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 980.108084][T22149] device veth1_macvtap entered promiscuous mode [ 980.120254][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 980.132387][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 980.260266][ T49] device ip6gretap0 left promiscuous mode [ 980.274778][ T49] : port 1(ip6gretap0) entered disabled state [ 980.312185][T22175] device syzkaller0 entered promiscuous mode [ 980.677575][ T49] bridge0: port 3(gretap0) entered disabled state [ 980.694657][ T49] device gretap0 left promiscuous mode [ 980.700631][ T49] bridge0: port 3(gretap0) entered disabled state [ 980.885811][ T49] device veth0_to_team left promiscuous mode [ 980.894572][ T49] bridge0: port 4(veth0_to_team) entered disabled state [ 980.983581][ T49] device bridge_slave_1 left promiscuous mode [ 980.989986][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.055801][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.278318][T22257] device veth1_macvtap left promiscuous mode [ 982.316339][T22257] device macsec0 left promiscuous mode [ 982.837653][T22270] device wg2 entered promiscuous mode [ 983.446125][T22308] device wg2 entered promiscuous mode [ 983.551171][T22313] device sit0 entered promiscuous mode [ 984.019434][T22324] device syzkaller0 entered promiscuous mode [ 985.274256][T22384] device ip_vti0 entered promiscuous mode [ 985.683729][T22399] device syzkaller0 entered promiscuous mode [ 986.706072][T22460] device sit0 left promiscuous mode [ 986.827156][T22461] device sit0 entered promiscuous mode [ 987.486362][T13318] bridge0: port 3(syz_tun) entered disabled state [ 987.537282][T13318] device syz_tun left promiscuous mode [ 987.542888][T13318] bridge0: port 3(syz_tun) entered disabled state [ 987.719863][T22508] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.751172][T22508] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.856592][T22508] device bridge_slave_0 entered promiscuous mode [ 987.943397][T22508] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.996102][T22508] bridge0: port 2(bridge_slave_1) entered disabled state [ 988.003642][T22508] device bridge_slave_1 entered promiscuous mode [ 988.364515][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 988.372253][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 988.456244][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 988.471754][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 988.480014][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 988.487176][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 988.503949][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 988.512374][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 988.520672][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 988.527740][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 988.546187][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 988.554477][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 988.563153][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 988.571451][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 988.579897][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 988.602730][T22508] device veth0_vlan entered promiscuous mode [ 988.619655][T22508] device veth1_macvtap entered promiscuous mode [ 988.662946][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 988.687240][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 988.713421][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 988.722538][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 988.730983][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 988.779634][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 988.830336][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 988.876406][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 988.891899][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 988.906744][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 988.956778][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 988.964319][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 989.223544][T22551] bridge0: port 1(bridge_slave_0) entered blocking state [ 989.233984][T22551] bridge0: port 1(bridge_slave_0) entered disabled state [ 989.241998][T22551] device bridge_slave_0 entered promiscuous mode [ 989.249879][T22551] bridge0: port 2(bridge_slave_1) entered blocking state [ 989.257339][T22551] bridge0: port 2(bridge_slave_1) entered disabled state [ 989.264864][T22551] device bridge_slave_1 entered promiscuous mode [ 989.824414][T22551] bridge0: port 2(bridge_slave_1) entered blocking state [ 989.831543][T22551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 989.838858][T22551] bridge0: port 1(bridge_slave_0) entered blocking state [ 989.845893][T22551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 990.158522][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 990.176001][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.238513][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 990.283307][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 990.336477][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 990.346462][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 990.355601][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 990.364172][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 990.492885][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 990.501410][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 990.593707][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 990.615630][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 990.639598][T22551] device veth0_vlan entered promiscuous mode [ 990.651402][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 990.679631][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 990.757054][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 990.787386][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 990.827787][T22551] device veth1_macvtap entered promiscuous mode [ 990.899895][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 990.918785][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 990.936341][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 991.011783][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 991.063952][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 991.144436][T22607] device pim6reg1 entered promiscuous mode [ 991.173201][T22616] device syzkaller0 entered promiscuous mode [ 991.558491][ T49] device veth1 left promiscuous mode [ 991.593582][ T49] bridge0: port 3(veth1) entered disabled state [ 991.674690][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.705777][ T49] device bridge_slave_0 left promiscuous mode [ 991.729110][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.767963][ T49] device veth0_to_team left promiscuous mode [ 991.795632][ T49] bridge0: port 4(veth0_to_team) entered disabled state [ 991.823843][ T49] device bridge_slave_1 left promiscuous mode [ 991.850364][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.876739][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 992.903562][T22653] device syzkaller0 entered promiscuous mode [ 994.012081][T22741] IPv6: pim6reg1: Disabled Multicast RS [ 995.001163][T22802] device syzkaller0 entered promiscuous mode [ 995.418125][T22811] device syzkaller0 entered promiscuous mode [ 995.716173][T22845] device veth1_macvtap left promiscuous mode [ 995.722324][T22845] device macsec0 entered promiscuous mode [ 996.411969][T22923] device syzkaller0 entered promiscuous mode [ 997.514341][T23014] : port 1(ip6gretap0) entered blocking state [ 997.546096][T23014] : port 1(ip6gretap0) entered disabled state [ 997.552788][T23014] device ip6gretap0 entered promiscuous mode [ 997.562775][T22997] device wg2 left promiscuous mode [ 998.343464][T23064] device syzkaller0 entered promiscuous mode [ 998.894032][T23086] bY4`Ҙ: renamed from lo [ 1000.309137][T23155] IPv6: pim6reg1: Disabled Multicast RS [ 1000.384426][T23164] device veth0_vlan left promiscuous mode [ 1000.393540][T23164] device veth0_vlan entered promiscuous mode [ 1000.412505][T23168] device syzkaller0 entered promiscuous mode [ 1000.659051][T23155] device syzkaller0 entered promiscuous mode [ 1000.768123][T23191] : port 1(vlan1) entered blocking state [ 1000.779232][T23191] : port 1(vlan1) entered disabled state [ 1000.785618][T23191] device vlan1 entered promiscuous mode [ 1000.847503][T23206] device syzkaller0 entered promiscuous mode [ 1001.667813][T23268] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 1001.692922][T23269] syzkaller0: tun_chr_ioctl cmd 35108 [ 1001.702580][T23268] syzkaller0: tun_chr_ioctl cmd 35108 [ 1001.928080][T23281] device syzkaller0 entered promiscuous mode [ 1002.003086][T23279] device syzkaller0 entered promiscuous mode [ 1002.096175][T23279] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1002.921565][T23384] device veth1_macvtap left promiscuous mode [ 1003.274668][T23406] device syzkaller0 entered promiscuous mode [ 1003.310140][T23408] sock: sock_set_timeout: `syz.2.16196' (pid 23408) tries to set negative timeout [ 1007.744019][T23683] device syzkaller0 entered promiscuous mode [ 1008.180002][T23711] device syzkaller0 entered promiscuous mode [ 1008.281228][T23711] device syzkaller0 left promiscuous mode [ 1009.175437][T23740] bY4`Ҙ: renamed from lo [ 1009.320869][T23743] device syzkaller0 entered promiscuous mode [ 1009.706848][T23774] device syzkaller0 entered promiscuous mode [ 1010.678490][T23818] device syzkaller0 entered promiscuous mode [ 1011.019328][T23830] device syzkaller0 entered promiscuous mode [ 1013.283634][T24004] bridge0: port 2(bridge_slave_1) entered disabled state [ 1013.290999][T24004] bridge0: port 1(bridge_slave_0) entered disabled state [ 1014.318898][T24101] device syzkaller0 entered promiscuous mode [ 1014.339024][T24101] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1014.387041][T24101] geneve1: tun_chr_ioctl cmd 1074025672 [ 1014.402777][T24101] geneve1: ignored: set checksum enabled [ 1015.447951][T24140] device syzkaller0 entered promiscuous mode [ 1016.538636][T24235] pimreg0: tun_chr_ioctl cmd 35111 [ 1017.092009][T24272] batadv0: tun_chr_ioctl cmd 1074025692 [ 1017.154684][T24273] batadv0: tun_chr_ioctl cmd 1074812118 [ 1018.219100][T24296] device syzkaller0 entered promiscuous mode [ 1018.234377][T24313] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 1019.394289][T24363] device erspan0 entered promiscuous mode [ 1020.452857][T24387] device syzkaller0 entered promiscuous mode [ 1021.012400][T24407] device syzkaller0 entered promiscuous mode [ 1021.150584][ T9857] syzkaller0: tun_net_xmit 48 [ 1021.155508][T24407] device syzkaller0 left promiscuous mode [ 1021.307664][T24437] device syzkaller0 entered promiscuous mode [ 1021.988797][T24457] tap0: tun_chr_ioctl cmd 1074025677 [ 1021.994148][T24457] tap0: linktype set to 768 [ 1022.139413][T24477] : renamed from bond_slave_0 [ 1023.298584][T24555] device syzkaller0 entered promiscuous mode [ 1024.373396][T24636] device syzkaller0 entered promiscuous mode [ 1026.334995][T24683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1026.342262][T24683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1026.354563][T24683] device bridge_slave_1 left promiscuous mode [ 1026.370452][T24683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1026.380985][T24683] device bridge_slave_0 left promiscuous mode [ 1026.387929][T24683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1027.375932][T24746] device syzkaller0 entered promiscuous mode [ 1027.463330][T24741] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1027.610581][T24768] bridge0: port 3(veth1) entered blocking state [ 1027.646175][T24768] bridge0: port 3(veth1) entered disabled state [ 1027.652940][T24768] device veth1 entered promiscuous mode [ 1029.282868][T24847] device syzkaller0 entered promiscuous mode [ 1030.348822][T24916] device veth1_macvtap entered promiscuous mode [ 1030.376113][T24916] device macsec0 left promiscuous mode [ 1030.396001][T24916] device veth1_macvtap left promiscuous mode [ 1030.950641][T24954] device veth1_macvtap left promiscuous mode [ 1030.979941][T24954] device veth1_macvtap entered promiscuous mode [ 1030.996042][T24954] device macsec0 entered promiscuous mode [ 1031.007637][T24956] IPv6: pim6reg1: Disabled Multicast RS [ 1031.019998][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1031.604009][T24991] device syzkaller0 entered promiscuous mode [ 1031.626924][T24989] tap0: tun_chr_ioctl cmd 1074025677 [ 1031.637726][T24989] tap0: linktype set to 7 [ 1032.172830][T25021] device syzkaller0 entered promiscuous mode [ 1032.215436][T25030] tun0: tun_chr_ioctl cmd 1074025678 [ 1032.225371][T25030] tun0: group set to 1 [ 1032.520057][T25042] device syzkaller0 entered promiscuous mode [ 1032.572167][T25042] batadv0: tun_chr_ioctl cmd 1074025677 [ 1032.610651][T25042] batadv0: linktype set to 776 [ 1033.239493][T25087] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1033.279170][T25087] device syzkaller0 entered promiscuous mode [ 1034.206480][T25124] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1034.238698][T25124] syzkaller0: linktype set to 0 [ 1035.247195][T25169] @: renamed from bond_slave_0 [ 1035.870043][T25194] bridge0: port 1(bridge_slave_0) entered disabled state [ 1035.910695][T25194] bridge0: port 1(bridge_slave_0) entered blocking state [ 1035.917924][T25194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1037.299088][T25286] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 1037.778726][T25306] syz.4.16743[25306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1037.778786][T25306] syz.4.16743[25306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1037.975651][T25304] device syzkaller0 entered promiscuous mode [ 1038.033819][T25317] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 1038.200118][T25327] -: renamed from syzkaller0 [ 1038.668425][T25370] device syzkaller0 entered promiscuous mode [ 1039.113154][T25415] device syzkaller0 entered promiscuous mode [ 1042.253095][T25604] syzkaller0: refused to change device tx_queue_len [ 1043.740706][T25671] device syzkaller0 entered promiscuous mode [ 1044.124379][T25691] device syzkaller0 entered promiscuous mode [ 1044.327924][T25710] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 1044.334099][T25710] syzkaller0: persist disabled [ 1045.499500][T25803] device syzkaller0 entered promiscuous mode [ 1046.230474][T25877] device syzkaller0 entered promiscuous mode [ 1046.886360][T25923] device syzkaller0 entered promiscuous mode [ 1047.997024][T25995] bridge0: port 2(bridge_slave_1) entered disabled state [ 1048.004263][T25995] bridge0: port 1(bridge_slave_0) entered disabled state [ 1048.023173][T25995] device bridge_slave_1 left promiscuous mode [ 1048.034853][T25995] bridge0: port 2(bridge_slave_1) entered disabled state [ 1048.043028][T25995] device bridge_slave_0 left promiscuous mode [ 1048.063832][T25995] bridge0: port 1(bridge_slave_0) entered disabled state [ 1048.131994][T26000] device tunl0 entered promiscuous mode [ 1048.187662][T26009] device syzkaller0 entered promiscuous mode [ 1048.797316][T26019] device syzkaller0 entered promiscuous mode [ 1048.981158][T26047] device syzkaller0 entered promiscuous mode [ 1049.171643][T26054] device veth0_vlan left promiscuous mode [ 1049.200667][T26054] device veth0_vlan entered promiscuous mode [ 1049.280107][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1049.299288][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1049.351671][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1049.826733][T26091] pimreg: tun_chr_ioctl cmd 1074025677 [ 1049.859557][T26091] pimreg: linktype set to 6 [ 1054.024912][T26331] device syzkaller0 entered promiscuous mode [ 1055.398024][T26424] device syzkaller0 entered promiscuous mode [ 1056.737035][T26489] bridge0: port 3(syz_tun) entered disabled state [ 1056.743674][T26489] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.750987][T26489] bridge0: port 1(bridge_slave_0) entered disabled state [ 1059.548003][T26650] device sit0 entered promiscuous mode [ 1061.218803][T26771] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.226063][T26771] bridge0: port 1(bridge_slave_0) entered disabled state [ 1061.317239][T26771] device bridge_slave_1 left promiscuous mode [ 1061.323636][T26771] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.338043][T26771] bridge0: port 1(bridge_slave_0) entered disabled state [ 1061.679247][T26787] device syzkaller0 entered promiscuous mode [ 1062.581977][T26830] tap0: tun_chr_ioctl cmd 2147767521 [ 1063.037128][T26851] device syzkaller0 entered promiscuous mode [ 1063.079111][T26861] device syzkaller0 entered promiscuous mode [ 1063.196164][T26886] device syzkaller0 entered promiscuous mode [ 1064.203138][T26971] : renamed from vlan1 [ 1064.209946][T26973] -1: renamed from syzkaller0 [ 1064.863463][T27006] device syzkaller0 entered promiscuous mode [ 1065.813359][T27067] device syzkaller0 entered promiscuous mode [ 1066.009072][T27088] device veth1_macvtap entered promiscuous mode [ 1066.020255][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1066.028599][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1066.128438][T24012] device syz_tun left promiscuous mode [ 1066.136008][T24012] bridge0: port 3(syz_tun) entered disabled state [ 1066.574642][T27117] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.586175][T27117] bridge0: port 1(bridge_slave_0) entered disabled state [ 1066.598050][T27117] device bridge_slave_0 entered promiscuous mode [ 1066.624442][T27117] bridge0: port 2(bridge_slave_1) entered blocking state [ 1066.638198][T27117] bridge0: port 2(bridge_slave_1) entered disabled state [ 1066.652975][T27117] device bridge_slave_1 entered promiscuous mode [ 1066.847210][T27117] bridge0: port 2(bridge_slave_1) entered blocking state [ 1066.854331][T27117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1066.861639][T27117] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.868698][T27117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1066.964262][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1066.980984][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1067.014364][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1067.065424][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1067.106975][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1067.132318][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1067.147015][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1067.171033][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1067.197096][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1067.224560][T27117] device veth0_vlan entered promiscuous mode [ 1067.233630][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1067.245531][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1067.298544][T27117] device veth1_macvtap entered promiscuous mode [ 1067.312067][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1067.330350][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1067.368537][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1067.411326][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1067.423761][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1067.437607][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1067.453392][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1067.897258][ T9] device veth0_to_team left promiscuous mode [ 1067.903371][ T9] bridge0: port 4(veth0_to_team) entered disabled state [ 1067.936007][ T9] device bridge_slave_1 left promiscuous mode [ 1067.942180][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1067.975473][ T9] device bridge_slave_0 left promiscuous mode [ 1067.981728][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1068.007173][ T9] device veth0_vlan left promiscuous mode [ 1068.329687][T27228] device syzkaller0 entered promiscuous mode [ 1071.058503][T27384] device wg2 entered promiscuous mode [ 1071.731365][T27445] device syzkaller0 entered promiscuous mode [ 1071.831742][T27445] syzkaller0: tun_net_xmit 1280 [ 1073.814167][T27502] device syzkaller0 entered promiscuous mode [ 1077.840571][T27617] device syzkaller0 entered promiscuous mode [ 1080.184665][T27675] device syzkaller0 entered promiscuous mode [ 1081.310763][T27516] syz.2.17389 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1081.390011][T27516] CPU: 0 PID: 27516 Comm: syz.2.17389 Tainted: G W syzkaller #0 [ 1081.398984][T27516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1081.409048][T27516] Call Trace: [ 1081.412362][T27516] __dump_stack+0x21/0x24 [ 1081.416706][T27516] dump_stack_lvl+0x1a7/0x208 [ 1081.421401][T27516] ? show_regs_print_info+0x18/0x18 [ 1081.426610][T27516] ? ___ratelimit+0x3de/0x560 [ 1081.431294][T27516] ? _raw_spin_lock+0x94/0xf0 [ 1081.435982][T27516] dump_stack+0x15/0x1c [ 1081.440148][T27516] dump_header+0xdd/0x650 [ 1081.444498][T27516] oom_kill_process+0x1fa/0x2c0 [ 1081.449361][T27516] out_of_memory+0x93f/0xd20 [ 1081.453964][T27516] ? unregister_oom_notifier+0x20/0x20 [ 1081.459541][T27516] ? mutex_lock_killable+0x92/0xf0 [ 1081.464672][T27516] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1081.471195][T27516] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1081.476751][T27516] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1081.482669][T27516] ? _raw_spin_trylock_bh+0x150/0x150 [ 1081.488148][T27516] ? _raw_spin_unlock+0x4d/0x70 [ 1081.493019][T27516] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1081.498578][T27516] try_charge+0xf69/0x1500 [ 1081.503010][T27516] ? __memcg_kmem_charge+0x150/0x150 [ 1081.508315][T27516] ? percpu_counter_add_batch+0x13c/0x160 [ 1081.514059][T27516] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1081.519615][T27516] __mem_cgroup_charge+0x14c/0x6d0 [ 1081.524742][T27516] shmem_add_to_page_cache+0x574/0xe30 [ 1081.530232][T27516] ? shmem_alloc_page+0x380/0x380 [ 1081.535273][T27516] ? find_lock_entry+0x4b/0x200 [ 1081.540133][T27516] shmem_getpage_gfp+0x8eb/0x2120 [ 1081.545180][T27516] shmem_write_begin+0xce/0x1b0 [ 1081.550047][T27516] generic_perform_write+0x2ce/0x540 [ 1081.555353][T27516] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1081.561173][T27516] ? file_remove_privs+0x5b0/0x5b0 [ 1081.566328][T27516] ? __kasan_check_write+0x14/0x20 [ 1081.571450][T27516] ? down_write+0xb2/0x120 [ 1081.575890][T27516] __generic_file_write_iter+0x24b/0x480 [ 1081.581536][T27516] ? generic_write_checks+0x3d4/0x480 [ 1081.586926][T27516] generic_file_write_iter+0xa9/0x1d0 [ 1081.592311][T27516] __kernel_write+0x535/0x910 [ 1081.597016][T27516] ? vfs_read+0xa60/0xa60 [ 1081.601361][T27516] ? populate_vma_page_range+0xf0/0xf0 [ 1081.606856][T27516] ? cgroup_freezing+0x86/0xb0 [ 1081.611636][T27516] ? freezing_slow_path+0x10a/0x150 [ 1081.616856][T27516] dump_emit+0x246/0x370 [ 1081.621112][T27516] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 1081.626585][T27516] ? dump_user_range+0x71/0x1a0 [ 1081.631449][T27516] dump_user_range+0x6a/0x1a0 [ 1081.636157][T27516] elf_core_dump+0x2866/0x2cc0 [ 1081.640945][T27516] ? load_elf_binary+0x28e0/0x28e0 [ 1081.646067][T27516] ? __fsnotify_parent+0x6db/0x7c0 [ 1081.651295][T27516] ? do_truncate+0x1c6/0x240 [ 1081.655905][T27516] ? putname+0xfe/0x150 [ 1081.660077][T27516] ? __kasan_check_read+0x11/0x20 [ 1081.665126][T27516] ? cgroup_freezing+0x86/0xb0 [ 1081.669906][T27516] ? freezing_slow_path+0x10a/0x150 [ 1081.675124][T27516] do_coredump+0x1ba3/0x28e0 [ 1081.679739][T27516] ? simple_acl_create+0x1c0/0x1c0 [ 1081.684871][T27516] ? debug_smp_processor_id+0x17/0x20 [ 1081.690258][T27516] ? kmem_cache_free+0x100/0x2d0 [ 1081.695211][T27516] ? ____kasan_slab_free+0x130/0x160 [ 1081.700517][T27516] ? get_signal+0xb98/0x12e0 [ 1081.705123][T27516] ? kmem_cache_free+0x100/0x2d0 [ 1081.710081][T27516] get_signal+0xf23/0x12e0 [ 1081.714527][T27516] arch_do_signal_or_restart+0xe2/0x11d0 [ 1081.720174][T27516] ? send_signal+0x3b1/0x590 [ 1081.724778][T27516] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 1081.730420][T27516] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1081.736272][T27516] ? force_sig+0xca/0x120 [ 1081.740619][T27516] ? send_sig+0x70/0x70 [ 1081.744805][T27516] exit_to_user_mode_loop+0xa2/0xe0 [ 1081.750010][T27516] exit_to_user_mode_prepare+0x76/0xa0 [ 1081.755480][T27516] irqentry_exit_to_user_mode+0x9/0x10 [ 1081.760947][T27516] irqentry_exit+0x12/0x60 [ 1081.765372][T27516] exc_general_protection+0x1ca/0x250 [ 1081.770753][T27516] ? debug_smp_processor_id+0x17/0x20 [ 1081.776148][T27516] ? asm_exc_general_protection+0x8/0x30 [ 1081.781788][T27516] asm_exc_general_protection+0x1e/0x30 [ 1081.787343][T27516] RIP: 0033:0x7fbb108aff81 [ 1081.791798][T27516] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1081.811428][T27516] RSP: 002b:00002000000000e0 EFLAGS: 00010217 [ 1081.817507][T27516] RAX: 0000000000000000 RBX: 00007fbb10b2a090 RCX: 00007fbb108aff79 [ 1081.825502][T27516] RDX: 0000200000000180 RSI: 00002000000000e0 RDI: 0000000004000000 [ 1081.833489][T27516] RBP: 00007fbb109467e0 R08: 0000200000000200 R09: 0000200000000200 [ 1081.841471][T27516] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 1081.849451][T27516] R13: 00007fbb10b2a128 R14: 00007fbb10b2a090 R15: 00007ffd75ae0e38 [ 1082.131055][T27516] memory: usage 307200kB, limit 307200kB, failcnt 15835 [ 1082.138105][T27516] memory+swap: usage 404268kB, limit 9007199254740988kB, failcnt 0 [ 1082.146248][T27516] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1082.153146][T27516] Memory cgroup stats for /syz2: [ 1082.153289][T27516] anon 135168 [ 1082.153289][T27516] file 285609984 [ 1082.153289][T27516] kernel_stack 0 [ 1082.153289][T27516] percpu 0 [ 1082.153289][T27516] sock 0 [ 1082.153289][T27516] shmem 285745152 [ 1082.153289][T27516] file_mapped 135168 [ 1082.153289][T27516] file_dirty 0 [ 1082.153289][T27516] file_writeback 17571840 [ 1082.153289][T27516] anon_thp 0 [ 1082.153289][T27516] inactive_anon 313307136 [ 1082.153289][T27516] active_anon 946176 [ 1082.153289][T27516] inactive_file 24576 [ 1082.153289][T27516] active_file 196608 [ 1082.153289][T27516] unevictable 0 [ 1082.153289][T27516] slab_reclaimable 0 [ 1082.153289][T27516] slab_unreclaimable 0 [ 1082.153289][T27516] slab 0 [ 1082.153289][T27516] workingset_refault_anon 0 [ 1082.153289][T27516] workingset_refault_file 5247 [ 1082.153289][T27516] workingset_activate_anon 0 [ 1082.153289][T27516] workingset_activate_file 2244 [ 1082.153289][T27516] workingset_restore_anon 0 [ 1082.153289][T27516] workingset_restore_file 1980 [ 1082.534366][T27516] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27518,uid=0 [ 1082.549732][T27516] Memory cgroup out of memory: Killed process 27518 (syz.2.17389) total-vm:90436kB, anon-rss:1244kB, file-rss:31700kB, shmem-rss:0kB, UID:0 pgtables:164kB oom_score_adj:1000 [ 1083.859773][T27700] syz-executor invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1083.941807][T27700] CPU: 1 PID: 27700 Comm: syz-executor Tainted: G W syzkaller #0 [ 1083.950869][T27700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1083.960938][T27700] Call Trace: [ 1083.964250][T27700] __dump_stack+0x21/0x24 [ 1083.968602][T27700] dump_stack_lvl+0x1a7/0x208 [ 1083.973295][T27700] ? show_regs_print_info+0x18/0x18 [ 1083.978506][T27700] ? ___ratelimit+0x3de/0x560 [ 1083.983208][T27700] ? __kasan_check_write+0x14/0x20 [ 1083.988341][T27700] ? _raw_spin_lock+0x94/0xf0 [ 1083.993046][T27700] dump_stack+0x15/0x1c [ 1083.997221][T27700] dump_header+0xdd/0x650 [ 1084.001566][T27700] oom_kill_process+0x1fa/0x2c0 [ 1084.006439][T27700] out_of_memory+0x93f/0xd20 [ 1084.011073][T27700] ? unregister_oom_notifier+0x20/0x20 [ 1084.016552][T27700] ? mutex_lock_killable+0x92/0xf0 [ 1084.021686][T27700] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1084.028205][T27700] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1084.033777][T27700] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1084.039337][T27700] ? _raw_spin_trylock_bh+0x150/0x150 [ 1084.044727][T27700] ? _raw_spin_unlock+0x4d/0x70 [ 1084.049595][T27700] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1084.055157][T27700] try_charge+0xf69/0x1500 [ 1084.059604][T27700] ? __memcg_kmem_charge+0x150/0x150 [ 1084.064907][T27700] ? __alloc_pages_nodemask+0x290/0x620 [ 1084.070473][T27700] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1084.076031][T27700] __mem_cgroup_charge+0x14c/0x6d0 [ 1084.081157][T27700] wp_page_copy+0x28d/0x15f0 [ 1084.085764][T27700] ? trace_spf_pte_lock+0x110/0x110 [ 1084.090994][T27700] do_wp_page+0x9a6/0xc80 [ 1084.095353][T27700] handle_pte_fault+0xac1/0x3750 [ 1084.100324][T27700] handle_mm_fault+0xf81/0x1710 [ 1084.105202][T27700] ? can_reuse_spf_vma+0xe0/0xe0 [ 1084.110165][T27700] ? memset+0x35/0x40 [ 1084.114165][T27700] ? vmacache_update+0xb7/0x120 [ 1084.119236][T27700] ? find_vma+0x13b/0x150 [ 1084.123582][T27700] do_user_addr_fault+0x5a8/0xc90 [ 1084.128632][T27700] ? do_kern_addr_fault+0x80/0x80 [ 1084.133676][T27700] ? __this_cpu_preempt_check+0x13/0x20 [ 1084.139253][T27700] ? __perf_event_task_sched_in+0x213/0x290 [ 1084.145159][T27700] exc_page_fault+0x5a/0xc0 [ 1084.149681][T27700] asm_exc_page_fault+0x1e/0x30 [ 1084.154567][T27700] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1084.160303][T27700] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 1084.179925][T27700] RSP: 0018:ffffc90000c67f28 EFLAGS: 00050293 [ 1084.186011][T27700] RAX: 00000000000005ab RBX: 00007fffffffeffd RCX: 000055555b2fd7d0 [ 1084.193992][T27700] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff888121c1e2c0 [ 1084.201984][T27700] RBP: ffffc90000c67f48 R08: ffff88810de5f76b R09: 1ffff11021bcbeed [ 1084.209974][T27700] R10: dffffc0000000000 R11: ffffed1021bcbeee R12: 0000000000000000 [ 1084.217963][T27700] R13: 0000000000000000 R14: 000055555b2fd7d0 R15: dffffc0000000000 [ 1084.225967][T27700] ? schedule_tail+0x94/0xc0 [ 1084.230569][T27700] ret_from_fork+0x8/0x30 [ 1084.234906][T27700] RIP: 0033:0x7fbb108d8a12 [ 1084.239333][T27700] Code: Unable to access opcode bytes at RIP 0x7fbb108d89e8. [ 1084.246710][T27700] RSP: 002b:00007ffd75ae1050 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1084.255315][T27700] RAX: 0000000000000000 RBX: 00007ffd75ae1050 RCX: 00007fbb108d8a12 [ 1084.263303][T27700] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1084.271299][T27700] RBP: 00007ffd75ae11dc R08: 0000000000000000 R09: 0000000000000001 [ 1084.279288][T27700] R10: 000055555b2fd7d0 R11: 0000000000000246 R12: 0000000000000000 [ 1084.287363][T27700] R13: 00000000000927c0 R14: 00000000001087a2 R15: 00007ffd75ae1230 [ 1084.876070][T27700] memory: usage 307200kB, limit 307200kB, failcnt 21505 [ 1084.894886][T27700] memory+swap: usage 428580kB, limit 9007199254740988kB, failcnt 0 [ 1084.926067][T27700] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1084.945700][T27700] Memory cgroup stats for /syz2: [ 1084.945863][T27700] anon 0 [ 1084.945863][T27700] file 310616064 [ 1084.945863][T27700] kernel_stack 0 [ 1084.945863][T27700] percpu 0 [ 1084.945863][T27700] sock 0 [ 1084.945863][T27700] shmem 310616064 [ 1084.945863][T27700] file_mapped 0 [ 1084.945863][T27700] file_dirty 0 [ 1084.945863][T27700] file_writeback 0 [ 1084.945863][T27700] anon_thp 0 [ 1084.945863][T27700] inactive_anon 312745984 [ 1084.945863][T27700] active_anon 1486848 [ 1084.945863][T27700] inactive_file 0 [ 1084.945863][T27700] active_file 0 [ 1084.945863][T27700] unevictable 0 [ 1084.945863][T27700] slab_reclaimable 0 [ 1084.945863][T27700] slab_unreclaimable 0 [ 1084.945863][T27700] slab 0 [ 1084.945863][T27700] workingset_refault_anon 0 [ 1084.945863][T27700] workingset_refault_file 8712 [ 1084.945863][T27700] workingset_activate_anon 0 [ 1084.945863][T27700] workingset_activate_file 5181 [ 1084.945863][T27700] workingset_restore_anon 0 [ 1084.945863][T27700] workingset_restore_file 3894 [ 1085.056055][T27700] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27514,uid=0 [ 1085.084828][T27700] Memory cgroup out of memory: Killed process 27514 (syz.2.17389) total-vm:90436kB, anon-rss:1244kB, file-rss:32396kB, shmem-rss:0kB, UID:0 pgtables:168kB oom_score_adj:1000 [ 1085.165477][T27529] syz.2.17389 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1085.296630][T27529] CPU: 1 PID: 27529 Comm: syz.2.17389 Tainted: G W syzkaller #0 [ 1085.305625][T27529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1085.316087][T27529] Call Trace: [ 1085.319412][T27529] __dump_stack+0x21/0x24 [ 1085.323755][T27529] dump_stack_lvl+0x1a7/0x208 [ 1085.328437][T27529] ? show_regs_print_info+0x18/0x18 [ 1085.333642][T27529] ? ___ratelimit+0x3de/0x560 [ 1085.338329][T27529] ? __kasan_check_write+0x14/0x20 [ 1085.343441][T27529] ? _raw_spin_lock+0x94/0xf0 [ 1085.348128][T27529] dump_stack+0x15/0x1c [ 1085.352282][T27529] dump_header+0xdd/0x650 [ 1085.356630][T27529] oom_kill_process+0x1fa/0x2c0 [ 1085.361485][T27529] out_of_memory+0x93f/0xd20 [ 1085.366085][T27529] ? unregister_oom_notifier+0x20/0x20 [ 1085.371554][T27529] ? mutex_lock_killable+0xdf/0xf0 [ 1085.376675][T27529] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1085.383192][T27529] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1085.388744][T27529] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1085.394298][T27529] ? _raw_spin_trylock_bh+0x150/0x150 [ 1085.399688][T27529] ? _raw_spin_unlock+0x4d/0x70 [ 1085.404548][T27529] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1085.410098][T27529] try_charge+0xf69/0x1500 [ 1085.414530][T27529] ? __memcg_kmem_charge+0x150/0x150 [ 1085.419817][T27529] ? percpu_counter_add_batch+0x13c/0x160 [ 1085.425540][T27529] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1085.431089][T27529] __mem_cgroup_charge+0x14c/0x6d0 [ 1085.436207][T27529] shmem_add_to_page_cache+0x574/0xe30 [ 1085.441672][T27529] ? shmem_alloc_page+0x380/0x380 [ 1085.446699][T27529] ? _raw_spin_lock_irqsave+0x130/0x130 [ 1085.452249][T27529] ? find_lock_entry+0x4b/0x200 [ 1085.457105][T27529] shmem_getpage_gfp+0x8eb/0x2120 [ 1085.462138][T27529] shmem_write_begin+0xce/0x1b0 [ 1085.466993][T27529] generic_perform_write+0x2ce/0x540 [ 1085.472281][T27529] ? atime_needs_update+0x5b0/0x5b0 [ 1085.477490][T27529] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1085.483299][T27529] ? file_remove_privs+0x5b0/0x5b0 [ 1085.488420][T27529] ? __kasan_check_write+0x14/0x20 [ 1085.493539][T27529] ? down_write+0xb2/0x120 [ 1085.497965][T27529] __generic_file_write_iter+0x24b/0x480 [ 1085.503605][T27529] ? generic_write_checks+0x3d4/0x480 [ 1085.508986][T27529] generic_file_write_iter+0xa9/0x1d0 [ 1085.514359][T27529] __kernel_write+0x535/0x910 [ 1085.519038][T27529] ? vfs_read+0xa60/0xa60 [ 1085.523382][T27529] ? populate_vma_page_range+0xf0/0xf0 [ 1085.528866][T27529] ? cgroup_freezing+0x86/0xb0 [ 1085.533653][T27529] ? freezing_slow_path+0x10a/0x150 [ 1085.538858][T27529] dump_emit+0x246/0x370 [ 1085.543122][T27529] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 1085.548588][T27529] ? dump_user_range+0x125/0x1a0 [ 1085.553530][T27529] dump_user_range+0x6a/0x1a0 [ 1085.558214][T27529] elf_core_dump+0x2866/0x2cc0 [ 1085.562988][T27529] ? load_elf_binary+0x28e0/0x28e0 [ 1085.568103][T27529] ? __fsnotify_parent+0x6db/0x7c0 [ 1085.573253][T27529] ? do_truncate+0x1c6/0x240 [ 1085.577844][T27529] ? putname+0xfe/0x150 [ 1085.582005][T27529] ? __kasan_check_read+0x11/0x20 [ 1085.587215][T27529] ? cgroup_freezing+0x86/0xb0 [ 1085.591984][T27529] ? freezing_slow_path+0x10a/0x150 [ 1085.597197][T27529] do_coredump+0x1ba3/0x28e0 [ 1085.601798][T27529] ? simple_acl_create+0x1c0/0x1c0 [ 1085.606911][T27529] ? debug_smp_processor_id+0x17/0x20 [ 1085.612288][T27529] ? kmem_cache_free+0x100/0x2d0 [ 1085.617236][T27529] ? ____kasan_slab_free+0x130/0x160 [ 1085.622532][T27529] ? get_signal+0xb98/0x12e0 [ 1085.627129][T27529] ? kmem_cache_free+0x100/0x2d0 [ 1085.632076][T27529] get_signal+0xf23/0x12e0 [ 1085.636501][T27529] arch_do_signal_or_restart+0xe2/0x11d0 [ 1085.642143][T27529] ? send_signal+0x3b1/0x590 [ 1085.646740][T27529] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 1085.652377][T27529] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1085.658192][T27529] ? force_sig+0xca/0x120 [ 1085.662523][T27529] ? send_sig+0x70/0x70 [ 1085.666698][T27529] exit_to_user_mode_loop+0xa2/0xe0 [ 1085.672021][T27529] exit_to_user_mode_prepare+0x76/0xa0 [ 1085.677494][T27529] irqentry_exit_to_user_mode+0x9/0x10 [ 1085.682965][T27529] irqentry_exit+0x12/0x60 [ 1085.687386][T27529] exc_general_protection+0x1ca/0x250 [ 1085.692759][T27529] ? debug_smp_processor_id+0x17/0x20 [ 1085.698147][T27529] ? asm_exc_general_protection+0x8/0x30 [ 1085.703790][T27529] asm_exc_general_protection+0x1e/0x30 [ 1085.709371][T27529] RIP: 0033:0x7fbb108aff81 [ 1085.713790][T27529] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1085.733505][T27529] RSP: 002b:00002000000000e0 EFLAGS: 00010217 [ 1085.739584][T27529] RAX: 0000000000000000 RBX: 00007fbb10b2a090 RCX: 00007fbb108aff79 [ 1085.747560][T27529] RDX: 0000200000000180 RSI: 00002000000000e0 RDI: 0000000004000000 [ 1085.755544][T27529] RBP: 00007fbb109467e0 R08: 0000200000000200 R09: 0000200000000200 [ 1085.763530][T27529] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 1085.771505][T27529] R13: 00007fbb10b2a128 R14: 00007fbb10b2a090 R15: 00007ffd75ae0e38 [ 1085.793375][T27529] memory: usage 307124kB, limit 307200kB, failcnt 21606 [ 1085.818887][T27529] memory+swap: usage 416348kB, limit 9007199254740988kB, failcnt 0 [ 1085.861916][T27529] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1085.869431][T27529] Memory cgroup stats for /syz2: [ 1085.869560][T27529] anon 135168 [ 1085.869560][T27529] file 298991616 [ 1085.869560][T27529] kernel_stack 0 [ 1085.869560][T27529] percpu 0 [ 1085.869560][T27529] sock 0 [ 1085.869560][T27529] shmem 298721280 [ 1085.869560][T27529] file_mapped 0 [ 1085.869560][T27529] file_dirty 0 [ 1085.869560][T27529] file_writeback 0 [ 1085.869560][T27529] anon_thp 0 [ 1085.869560][T27529] inactive_anon 300937216 [ 1085.869560][T27529] active_anon 1486848 [ 1085.869560][T27529] inactive_file 0 [ 1085.869560][T27529] active_file 135168 [ 1085.869560][T27529] unevictable 0 [ 1085.869560][T27529] slab_reclaimable 0 [ 1085.869560][T27529] slab_unreclaimable 0 [ 1085.869560][T27529] slab 0 [ 1085.869560][T27529] workingset_refault_anon 0 [ 1085.869560][T27529] workingset_refault_file 8745 [ 1085.869560][T27529] workingset_activate_anon 0 [ 1085.869560][T27529] workingset_activate_file 5214 [ 1085.869560][T27529] workingset_restore_anon 0 [ 1085.869560][T27529] workingset_restore_file 3894 [ 1085.994754][T27529] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27520,uid=0 [ 1086.010554][T27529] Memory cgroup out of memory: Killed process 27520 (syz.2.17389) total-vm:90436kB, anon-rss:1244kB, file-rss:31304kB, shmem-rss:0kB, UID:0 pgtables:168kB oom_score_adj:1000 [ 1087.776685][T27831] device veth1_macvtap left promiscuous mode [ 1087.782794][T27831] device macsec0 left promiscuous mode [ 1089.638429][T27536] syz.2.17389 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1089.649825][T27906] device syzkaller0 entered promiscuous mode [ 1089.744111][T27536] CPU: 0 PID: 27536 Comm: syz.2.17389 Tainted: G W syzkaller #0 [ 1089.753098][T27536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1089.763167][T27536] Call Trace: [ 1089.766481][T27536] __dump_stack+0x21/0x24 [ 1089.770830][T27536] dump_stack_lvl+0x1a7/0x208 [ 1089.775532][T27536] ? show_regs_print_info+0x18/0x18 [ 1089.780751][T27536] ? ___ratelimit+0x3de/0x560 [ 1089.785467][T27536] ? _raw_spin_lock+0x94/0xf0 [ 1089.790332][T27536] dump_stack+0x15/0x1c [ 1089.794499][T27536] dump_header+0xdd/0x650 [ 1089.798839][T27536] oom_kill_process+0x1fa/0x2c0 [ 1089.803690][T27536] out_of_memory+0x93f/0xd20 [ 1089.808287][T27536] ? unregister_oom_notifier+0x20/0x20 [ 1089.813769][T27536] ? mutex_lock_killable+0x92/0xf0 [ 1089.818883][T27536] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1089.825389][T27536] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1089.830965][T27536] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1089.836517][T27536] ? _raw_spin_trylock_bh+0x150/0x150 [ 1089.841892][T27536] ? _raw_spin_unlock+0x4d/0x70 [ 1089.846745][T27536] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1089.852295][T27536] try_charge+0xf69/0x1500 [ 1089.856726][T27536] ? __memcg_kmem_charge+0x150/0x150 [ 1089.862022][T27536] ? percpu_counter_add_batch+0x13c/0x160 [ 1089.867750][T27536] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1089.873298][T27536] __mem_cgroup_charge+0x14c/0x6d0 [ 1089.878416][T27536] shmem_add_to_page_cache+0x574/0xe30 [ 1089.883911][T27536] ? shmem_alloc_page+0x380/0x380 [ 1089.888952][T27536] ? _raw_spin_lock_irqsave+0x130/0x130 [ 1089.894550][T27536] ? find_lock_entry+0x4b/0x200 [ 1089.899411][T27536] shmem_getpage_gfp+0x8eb/0x2120 [ 1089.904466][T27536] shmem_write_begin+0xce/0x1b0 [ 1089.909334][T27536] generic_perform_write+0x2ce/0x540 [ 1089.914633][T27536] ? atime_needs_update+0x5b0/0x5b0 [ 1089.919845][T27536] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1089.925664][T27536] ? file_remove_privs+0x5b0/0x5b0 [ 1089.930783][T27536] ? __kasan_check_write+0x14/0x20 [ 1089.935901][T27536] ? down_write+0xb2/0x120 [ 1089.940325][T27536] __generic_file_write_iter+0x24b/0x480 [ 1089.945962][T27536] ? generic_write_checks+0x3d4/0x480 [ 1089.951471][T27536] generic_file_write_iter+0xa9/0x1d0 [ 1089.956937][T27536] __kernel_write+0x535/0x910 [ 1089.961624][T27536] ? vfs_read+0xa60/0xa60 [ 1089.966018][T27536] ? populate_vma_page_range+0xf0/0xf0 [ 1089.971477][T27536] ? get_dump_page+0x4e1/0x5a0 [ 1089.976364][T27536] ? cgroup_freezing+0x86/0xb0 [ 1089.981136][T27536] ? freezing_slow_path+0x10a/0x150 [ 1089.986340][T27536] dump_emit+0x246/0x370 [ 1089.990585][T27536] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 1089.996067][T27536] ? dump_user_range+0xa0/0x1a0 [ 1090.000921][T27536] dump_user_range+0x6a/0x1a0 [ 1090.005611][T27536] elf_core_dump+0x2866/0x2cc0 [ 1090.010502][T27536] ? load_elf_binary+0x28e0/0x28e0 [ 1090.015622][T27536] ? __fsnotify_parent+0x6db/0x7c0 [ 1090.020753][T27536] ? do_truncate+0x1c6/0x240 [ 1090.025349][T27536] ? putname+0xfe/0x150 [ 1090.029516][T27536] ? __kasan_check_read+0x11/0x20 [ 1090.034553][T27536] ? cgroup_freezing+0x86/0xb0 [ 1090.039323][T27536] ? freezing_slow_path+0x10a/0x150 [ 1090.044525][T27536] do_coredump+0x1ba3/0x28e0 [ 1090.049129][T27536] ? simple_acl_create+0x1c0/0x1c0 [ 1090.054513][T27536] ? debug_smp_processor_id+0x17/0x20 [ 1090.059890][T27536] ? kmem_cache_free+0x100/0x2d0 [ 1090.064850][T27536] ? ____kasan_slab_free+0x130/0x160 [ 1090.070143][T27536] ? get_signal+0xb98/0x12e0 [ 1090.074741][T27536] ? kmem_cache_free+0x100/0x2d0 [ 1090.079686][T27536] get_signal+0xf23/0x12e0 [ 1090.084118][T27536] arch_do_signal_or_restart+0xe2/0x11d0 [ 1090.089763][T27536] ? send_signal+0x3b1/0x590 [ 1090.094364][T27536] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 1090.100016][T27536] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1090.105829][T27536] ? force_sig+0xca/0x120 [ 1090.110163][T27536] ? send_sig+0x70/0x70 [ 1090.114330][T27536] exit_to_user_mode_loop+0xa2/0xe0 [ 1090.119640][T27536] exit_to_user_mode_prepare+0x76/0xa0 [ 1090.125124][T27536] irqentry_exit_to_user_mode+0x9/0x10 [ 1090.130759][T27536] irqentry_exit+0x12/0x60 [ 1090.135178][T27536] exc_general_protection+0x1ca/0x250 [ 1090.140553][T27536] ? debug_smp_processor_id+0x17/0x20 [ 1090.145935][T27536] ? asm_exc_general_protection+0x8/0x30 [ 1090.151605][T27536] asm_exc_general_protection+0x1e/0x30 [ 1090.157153][T27536] RIP: 0033:0x7fbb108aff81 [ 1090.161587][T27536] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1090.181239][T27536] RSP: 002b:00002000000000e0 EFLAGS: 00010217 [ 1090.187318][T27536] RAX: 0000000000000000 RBX: 00007fbb10b2a090 RCX: 00007fbb108aff79 [ 1090.195302][T27536] RDX: 0000200000000180 RSI: 00002000000000e0 RDI: 0000000004000000 [ 1090.203281][T27536] RBP: 00007fbb109467e0 R08: 0000200000000200 R09: 0000200000000200 [ 1090.211272][T27536] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 1090.219256][T27536] R13: 00007fbb10b2a128 R14: 00007fbb10b2a090 R15: 00007ffd75ae0e38 [ 1090.280647][T27536] memory: usage 307200kB, limit 307200kB, failcnt 25055 [ 1090.287828][T27536] memory+swap: usage 429548kB, limit 9007199254740988kB, failcnt 0 [ 1090.295732][T27536] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1090.303007][T27536] Memory cgroup stats for /syz2: [ 1090.303130][T27536] anon 135168 [ 1090.303130][T27536] file 311832576 [ 1090.303130][T27536] kernel_stack 0 [ 1090.303130][T27536] percpu 0 [ 1090.303130][T27536] sock 0 [ 1090.303130][T27536] shmem 311697408 [ 1090.303130][T27536] file_mapped 135168 [ 1090.303130][T27536] file_dirty 0 [ 1090.303130][T27536] file_writeback 0 [ 1090.303130][T27536] anon_thp 0 [ 1090.303130][T27536] inactive_anon 312655872 [ 1090.303130][T27536] active_anon 1757184 [ 1090.303130][T27536] inactive_file 49152 [ 1090.303130][T27536] active_file 12288 [ 1090.303130][T27536] unevictable 0 [ 1090.303130][T27536] slab_reclaimable 0 [ 1090.303130][T27536] slab_unreclaimable 0 [ 1090.303130][T27536] slab 0 [ 1090.303130][T27536] workingset_refault_anon 0 [ 1090.303130][T27536] workingset_refault_file 11319 [ 1090.303130][T27536] workingset_activate_anon 0 [ 1090.303130][T27536] workingset_activate_file 7458 [ 1090.303130][T27536] workingset_restore_anon 0 [ 1090.303130][T27536] workingset_restore_file 5808 [ 1090.397436][T27536] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27519,uid=0 [ 1090.414850][T27536] Memory cgroup out of memory: Killed process 27519 (syz.2.17389) total-vm:90436kB, anon-rss:1228kB, file-rss:34772kB, shmem-rss:0kB, UID:0 pgtables:184kB oom_score_adj:1000 [ 1090.519564][T27517] syz.2.17389 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 1090.745775][T27956] device syzkaller0 entered promiscuous mode [ 1090.786013][T27517] CPU: 0 PID: 27517 Comm: syz.2.17389 Tainted: G W syzkaller #0 [ 1090.794993][T27517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1090.805067][T27517] Call Trace: [ 1090.808380][T27517] __dump_stack+0x21/0x24 [ 1090.812720][T27517] dump_stack_lvl+0x1a7/0x208 [ 1090.817427][T27517] ? show_regs_print_info+0x18/0x18 [ 1090.822639][T27517] ? ___ratelimit+0x3de/0x560 [ 1090.827513][T27517] ? __kasan_check_write+0x14/0x20 [ 1090.832643][T27517] ? _raw_spin_lock+0x94/0xf0 [ 1090.837338][T27517] dump_stack+0x15/0x1c [ 1090.841519][T27517] dump_header+0xdd/0x650 [ 1090.845876][T27517] oom_kill_process+0x1fa/0x2c0 [ 1090.850748][T27517] out_of_memory+0x93f/0xd20 [ 1090.855479][T27517] ? unregister_oom_notifier+0x20/0x20 [ 1090.860955][T27517] ? mutex_lock_killable+0xdf/0xf0 [ 1090.866173][T27517] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1090.872707][T27517] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1090.878260][T27517] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1090.883818][T27517] ? _raw_spin_trylock_bh+0x150/0x150 [ 1090.889288][T27517] ? _raw_spin_unlock+0x4d/0x70 [ 1090.894157][T27517] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1090.899718][T27517] try_charge+0xf69/0x1500 [ 1090.904154][T27517] ? __memcg_kmem_charge+0x150/0x150 [ 1090.909447][T27517] ? get_page_from_freelist+0x223b/0x23d0 [ 1090.915185][T27517] ? _raw_spin_trylock+0xb7/0x150 [ 1090.920229][T27517] ? read_pages+0x643/0xb60 [ 1090.924760][T27517] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1090.930408][T27517] __mem_cgroup_charge+0x14c/0x6d0 [ 1090.935537][T27517] __add_to_page_cache_locked+0x1fe/0x9a0 [ 1090.941277][T27517] ? __alloc_pages_nodemask+0x290/0x620 [ 1090.946837][T27517] ? put_page+0xd0/0xd0 [ 1090.951009][T27517] ? workingset_activation+0x250/0x250 [ 1090.956480][T27517] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 1090.962040][T27517] ? find_get_entry+0x37b/0x3e0 [ 1090.966921][T27517] ? page_cache_prev_miss+0x270/0x290 [ 1090.972319][T27517] add_to_page_cache_lru+0xa7/0x210 [ 1090.977533][T27517] pagecache_get_page+0x700/0x930 [ 1090.982585][T27517] filemap_fault+0x1b51/0x20d0 [ 1090.987373][T27517] ? generic_file_read_iter+0x5c0/0x5c0 [ 1090.992934][T27517] ? filemap_allow_speculation+0x10/0x10 [ 1090.998585][T27517] ? __kasan_check_write+0x14/0x20 [ 1091.003724][T27517] ext4_filemap_fault+0x8a/0xa0 [ 1091.008592][T27517] handle_pte_fault+0x1fa5/0x3750 [ 1091.013725][T27517] handle_mm_fault+0xf81/0x1710 [ 1091.018601][T27517] ? can_reuse_spf_vma+0xe0/0xe0 [ 1091.023580][T27517] ? follow_page_mask+0x7ad/0x1150 [ 1091.028724][T27517] __get_user_pages+0xbf8/0x1400 [ 1091.033684][T27517] ? populate_vma_page_range+0xf0/0xf0 [ 1091.039163][T27517] ? __kasan_check_write+0x14/0x20 [ 1091.044291][T27517] get_dump_page+0x160/0x5a0 [ 1091.048903][T27517] ? freezing_slow_path+0x10a/0x150 [ 1091.054118][T27517] ? __mm_populate+0x440/0x440 [ 1091.058903][T27517] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 1091.064393][T27517] dump_user_range+0x3c/0x1a0 [ 1091.069097][T27517] elf_core_dump+0x2866/0x2cc0 [ 1091.073877][T27517] ? load_elf_binary+0x28e0/0x28e0 [ 1091.079007][T27517] ? __fsnotify_parent+0x6db/0x7c0 [ 1091.084148][T27517] ? do_truncate+0x1c6/0x240 [ 1091.088755][T27517] ? putname+0xfe/0x150 [ 1091.092928][T27517] ? __kasan_check_read+0x11/0x20 [ 1091.097988][T27517] ? cgroup_freezing+0x86/0xb0 [ 1091.102767][T27517] ? freezing_slow_path+0x10a/0x150 [ 1091.108002][T27517] do_coredump+0x1ba3/0x28e0 [ 1091.112622][T27517] ? simple_acl_create+0x1c0/0x1c0 [ 1091.117752][T27517] ? debug_smp_processor_id+0x17/0x20 [ 1091.123145][T27517] ? kmem_cache_free+0x100/0x2d0 [ 1091.128125][T27517] ? ____kasan_slab_free+0x130/0x160 [ 1091.133429][T27517] ? get_signal+0xb98/0x12e0 [ 1091.138061][T27517] ? kmem_cache_free+0x100/0x2d0 [ 1091.143019][T27517] get_signal+0xf23/0x12e0 [ 1091.147455][T27517] arch_do_signal_or_restart+0xe2/0x11d0 [ 1091.153116][T27517] ? send_signal+0x3b1/0x590 [ 1091.157728][T27517] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 1091.163386][T27517] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1091.169204][T27517] ? force_sig+0xca/0x120 [ 1091.173549][T27517] ? send_sig+0x70/0x70 [ 1091.177720][T27517] exit_to_user_mode_loop+0xa2/0xe0 [ 1091.183108][T27517] exit_to_user_mode_prepare+0x76/0xa0 [ 1091.188591][T27517] irqentry_exit_to_user_mode+0x9/0x10 [ 1091.194160][T27517] irqentry_exit+0x12/0x60 [ 1091.198610][T27517] exc_general_protection+0x1ca/0x250 [ 1091.204010][T27517] ? debug_smp_processor_id+0x17/0x20 [ 1091.209407][T27517] ? asm_exc_general_protection+0x8/0x30 [ 1091.215069][T27517] asm_exc_general_protection+0x1e/0x30 [ 1091.220683][T27517] RIP: 0033:0x7fbb108aff81 [ 1091.225203][T27517] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1091.245015][T27517] RSP: 002b:00002000000000e0 EFLAGS: 00010217 [ 1091.251101][T27517] RAX: 0000000000000000 RBX: 00007fbb10b2a090 RCX: 00007fbb108aff79 [ 1091.259218][T27517] RDX: 0000200000000180 RSI: 00002000000000e0 RDI: 0000000004000000 [ 1091.267292][T27517] RBP: 00007fbb109467e0 R08: 0000200000000200 R09: 0000200000000200 [ 1091.275273][T27517] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 1091.283253][T27517] R13: 00007fbb10b2a128 R14: 00007fbb10b2a090 R15: 00007ffd75ae0e38 [ 1091.727597][T27969] device syzkaller0 entered promiscuous mode [ 1092.977843][T27517] memory: usage 307200kB, limit 307200kB, failcnt 29586 [ 1092.990911][T28002] : renamed from vlan1 [ 1092.994144][T27517] memory+swap: usage 429056kB, limit 9007199254740988kB, failcnt 0 [ 1093.010615][T27517] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1093.066954][T27517] Memory cgroup stats for /syz2: [ 1093.067084][T27517] anon 135168 [ 1093.067084][T27517] file 311156736 [ 1093.067084][T27517] kernel_stack 0 [ 1093.067084][T27517] percpu 0 [ 1093.067084][T27517] sock 0 [ 1093.067084][T27517] shmem 311156736 [ 1093.067084][T27517] file_mapped 135168 [ 1093.067084][T27517] file_dirty 0 [ 1093.067084][T27517] file_writeback 0 [ 1093.067084][T27517] anon_thp 0 [ 1093.067084][T27517] inactive_anon 311042048 [ 1093.067084][T27517] active_anon 3244032 [ 1093.067084][T27517] inactive_file 45056 [ 1093.067084][T27517] active_file 0 [ 1093.067084][T27517] unevictable 0 [ 1093.067084][T27517] slab_reclaimable 0 [ 1093.067084][T27517] slab_unreclaimable 0 [ 1093.067084][T27517] slab 0 [ 1093.067084][T27517] workingset_refault_anon 0 [ 1093.067084][T27517] workingset_refault_file 15543 [ 1093.067084][T27517] workingset_activate_anon 0 [ 1093.067084][T27517] workingset_activate_file 8547 [ 1093.067084][T27517] workingset_restore_anon 0 [ 1093.067084][T27517] workingset_restore_file 6468 [ 1093.316003][T27517] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27529,uid=0 [ 1093.406064][T27517] Memory cgroup out of memory: Killed process 27529 (syz.2.17389) total-vm:90436kB, anon-rss:1228kB, file-rss:33892kB, shmem-rss:0kB, UID:0 pgtables:188kB oom_score_adj:1000 [ 1093.468313][T27531] syz.2.17389 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1093.537498][T27531] CPU: 0 PID: 27531 Comm: syz.2.17389 Tainted: G W syzkaller #0 [ 1093.546475][T27531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1093.556536][T27531] Call Trace: [ 1093.559854][T27531] __dump_stack+0x21/0x24 [ 1093.564200][T27531] dump_stack_lvl+0x1a7/0x208 [ 1093.568907][T27531] ? show_regs_print_info+0x18/0x18 [ 1093.574113][T27531] ? ___ratelimit+0x3de/0x560 [ 1093.578812][T27531] ? __kasan_check_write+0x14/0x20 [ 1093.583936][T27531] ? _raw_spin_lock+0x94/0xf0 [ 1093.588630][T27531] dump_stack+0x15/0x1c [ 1093.592793][T27531] dump_header+0xdd/0x650 [ 1093.597136][T27531] oom_kill_process+0x1fa/0x2c0 [ 1093.601997][T27531] out_of_memory+0x93f/0xd20 [ 1093.606602][T27531] ? unregister_oom_notifier+0x20/0x20 [ 1093.612075][T27531] ? mutex_lock_killable+0xdf/0xf0 [ 1093.617216][T27531] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1093.623818][T27531] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1093.629375][T27531] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1093.634932][T27531] ? _raw_spin_trylock_bh+0x150/0x150 [ 1093.640319][T27531] ? _raw_spin_unlock+0x4d/0x70 [ 1093.645187][T27531] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1093.650745][T27531] try_charge+0xf69/0x1500 [ 1093.655268][T27531] ? __memcg_kmem_charge+0x150/0x150 [ 1093.660560][T27531] ? percpu_counter_add_batch+0x13c/0x160 [ 1093.666290][T27531] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1093.671956][T27531] __mem_cgroup_charge+0x14c/0x6d0 [ 1093.677081][T27531] shmem_add_to_page_cache+0x574/0xe30 [ 1093.682560][T27531] ? shmem_alloc_page+0x380/0x380 [ 1093.687684][T27531] ? _raw_spin_lock_irqsave+0x130/0x130 [ 1093.693243][T27531] ? find_lock_entry+0x4b/0x200 [ 1093.698104][T27531] shmem_getpage_gfp+0x8eb/0x2120 [ 1093.703153][T27531] shmem_write_begin+0xce/0x1b0 [ 1093.708053][T27531] generic_perform_write+0x2ce/0x540 [ 1093.713364][T27531] ? atime_needs_update+0x5b0/0x5b0 [ 1093.718615][T27531] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1093.724438][T27531] ? file_remove_privs+0x5b0/0x5b0 [ 1093.729569][T27531] ? __kasan_check_write+0x14/0x20 [ 1093.734697][T27531] ? down_write+0xb2/0x120 [ 1093.739158][T27531] __generic_file_write_iter+0x24b/0x480 [ 1093.744806][T27531] ? generic_write_checks+0x3d4/0x480 [ 1093.750191][T27531] generic_file_write_iter+0xa9/0x1d0 [ 1093.755579][T27531] __kernel_write+0x535/0x910 [ 1093.760293][T27531] ? vfs_read+0xa60/0xa60 [ 1093.764652][T27531] ? populate_vma_page_range+0xf0/0xf0 [ 1093.770136][T27531] ? cgroup_freezing+0x86/0xb0 [ 1093.774908][T27531] ? freezing_slow_path+0x10a/0x150 [ 1093.780120][T27531] dump_emit+0x246/0x370 [ 1093.784383][T27531] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 1093.789855][T27531] dump_user_range+0x6a/0x1a0 [ 1093.794560][T27531] elf_core_dump+0x2866/0x2cc0 [ 1093.799343][T27531] ? load_elf_binary+0x28e0/0x28e0 [ 1093.804497][T27531] ? __fsnotify_parent+0x6db/0x7c0 [ 1093.809636][T27531] ? do_truncate+0x1c6/0x240 [ 1093.814236][T27531] ? putname+0xfe/0x150 [ 1093.818685][T27531] ? __kasan_check_read+0x11/0x20 [ 1093.823735][T27531] ? cgroup_freezing+0x86/0xb0 [ 1093.828518][T27531] ? freezing_slow_path+0x10a/0x150 [ 1093.833728][T27531] do_coredump+0x1ba3/0x28e0 [ 1093.838437][T27531] ? simple_acl_create+0x1c0/0x1c0 [ 1093.843565][T27531] ? debug_smp_processor_id+0x17/0x20 [ 1093.848949][T27531] ? kmem_cache_free+0x100/0x2d0 [ 1093.853899][T27531] ? ____kasan_slab_free+0x130/0x160 [ 1093.859199][T27531] ? get_signal+0xb98/0x12e0 [ 1093.863805][T27531] ? kmem_cache_free+0x100/0x2d0 [ 1093.868779][T27531] get_signal+0xf23/0x12e0 [ 1093.873216][T27531] arch_do_signal_or_restart+0xe2/0x11d0 [ 1093.878860][T27531] ? preempt_schedule_thunk+0x16/0x18 [ 1093.884246][T27531] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 1093.889896][T27531] ? _raw_spin_unlock_irqrestore+0x74/0x80 [ 1093.895747][T27531] ? force_sig+0xca/0x120 [ 1093.900094][T27531] ? send_sig+0x70/0x70 [ 1093.904259][T27531] exit_to_user_mode_loop+0xa2/0xe0 [ 1093.909471][T27531] exit_to_user_mode_prepare+0x76/0xa0 [ 1093.914945][T27531] irqentry_exit_to_user_mode+0x9/0x10 [ 1093.920447][T27531] irqentry_exit+0x12/0x60 [ 1093.924878][T27531] exc_general_protection+0x1ca/0x250 [ 1093.930257][T27531] ? debug_smp_processor_id+0x17/0x20 [ 1093.935646][T27531] ? asm_exc_general_protection+0x8/0x30 [ 1093.941293][T27531] asm_exc_general_protection+0x1e/0x30 [ 1093.946846][T27531] RIP: 0033:0x7fbb108aff81 [ 1093.951269][T27531] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1093.970980][T27531] RSP: 002b:00002000000000e0 EFLAGS: 00010217 [ 1093.977061][T27531] RAX: 0000000000000000 RBX: 00007fbb10b2a090 RCX: 00007fbb108aff79 [ 1093.985047][T27531] RDX: 0000200000000180 RSI: 00002000000000e0 RDI: 0000000004000000 [ 1093.993040][T27531] RBP: 00007fbb109467e0 R08: 0000200000000200 R09: 0000200000000200 [ 1094.001016][T27531] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 1094.008998][T27531] R13: 00007fbb10b2a128 R14: 00007fbb10b2a090 R15: 00007ffd75ae0e38 [ 1094.035986][T27531] memory: usage 307188kB, limit 307200kB, failcnt 29938 [ 1094.042988][T27531] memory+swap: usage 429988kB, limit 9007199254740988kB, failcnt 0 [ 1094.065988][T27531] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1094.073046][T27531] Memory cgroup stats for /syz2: [ 1094.073173][T27531] anon 135168 [ 1094.073173][T27531] file 312102912 [ 1094.073173][T27531] kernel_stack 0 [ 1094.073173][T27531] percpu 0 [ 1094.073173][T27531] sock 0 [ 1094.073173][T27531] shmem 312238080 [ 1094.073173][T27531] file_mapped 135168 [ 1094.073173][T27531] file_dirty 0 [ 1094.073173][T27531] file_writeback 0 [ 1094.073173][T27531] anon_thp 0 [ 1094.073173][T27531] inactive_anon 311005184 [ 1094.073173][T27531] active_anon 3244032 [ 1094.073173][T27531] inactive_file 45056 [ 1094.073173][T27531] active_file 0 [ 1094.073173][T27531] unevictable 0 [ 1094.073173][T27531] slab_reclaimable 0 [ 1094.073173][T27531] slab_unreclaimable 0 [ 1094.073173][T27531] slab 0 [ 1094.073173][T27531] workingset_refault_anon 0 [ 1094.073173][T27531] workingset_refault_file 15543 [ 1094.073173][T27531] workingset_activate_anon 0 [ 1094.073173][T27531] workingset_activate_file 8547 [ 1094.073173][T27531] workingset_restore_anon 0 [ 1094.073173][T27531] workingset_restore_file 6468 [ 1094.403655][T28054] device veth1_macvtap entered promiscuous mode [ 1094.435479][T27531] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27511,uid=0 [ 1094.436283][T28054] device macsec0 entered promiscuous mode [ 1094.500319][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1094.534268][T27531] Memory cgroup out of memory: Killed process 27511 (syz.2.17389) total-vm:90436kB, anon-rss:1228kB, file-rss:34600kB, shmem-rss:0kB, UID:0 pgtables:184kB oom_score_adj:1000 [ 1094.569144][T28056] device syzkaller0 entered promiscuous mode [ 1094.825355][T28064] device syzkaller0 entered promiscuous mode [ 1095.914667][T28097] lo: mtu less than device minimum [ 1095.930772][T28100] device syzkaller0 entered promiscuous mode [ 1096.840769][T27521] syz.2.17389 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1096.850789][T27521] CPU: 0 PID: 27521 Comm: syz.2.17389 Tainted: G W syzkaller #0 [ 1096.859728][T27521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1096.869790][T27521] Call Trace: [ 1096.873097][T27521] __dump_stack+0x21/0x24 [ 1096.877447][T27521] dump_stack_lvl+0x1a7/0x208 [ 1096.882144][T27521] ? show_regs_print_info+0x18/0x18 [ 1096.887351][T27521] ? ___ratelimit+0x3de/0x560 [ 1096.892038][T27521] ? _raw_spin_lock+0x94/0xf0 [ 1096.896731][T27521] dump_stack+0x15/0x1c [ 1096.900897][T27521] dump_header+0xdd/0x650 [ 1096.905242][T27521] oom_kill_process+0x1fa/0x2c0 [ 1096.910109][T27521] out_of_memory+0x93f/0xd20 [ 1096.914724][T27521] ? unregister_oom_notifier+0x20/0x20 [ 1096.920200][T27521] ? mutex_lock_killable+0x92/0xf0 [ 1096.925362][T27521] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1096.931887][T27521] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1096.937455][T27521] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1096.943023][T27521] ? _raw_spin_trylock_bh+0x150/0x150 [ 1096.948409][T27521] ? _raw_spin_unlock+0x4d/0x70 [ 1096.953279][T27521] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1096.958838][T27521] try_charge+0xf69/0x1500 [ 1096.963279][T27521] ? __memcg_kmem_charge+0x150/0x150 [ 1096.968582][T27521] ? percpu_counter_add_batch+0x13c/0x160 [ 1096.974318][T27521] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1096.980147][T27521] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1096.985708][T27521] __mem_cgroup_charge+0x14c/0x6d0 [ 1096.990875][T27521] shmem_add_to_page_cache+0x574/0xe30 [ 1096.996359][T27521] ? shmem_alloc_page+0x380/0x380 [ 1097.001399][T27521] ? _raw_spin_lock_irqsave+0x130/0x130 [ 1097.006966][T27521] ? find_lock_entry+0x4b/0x200 [ 1097.011836][T27521] shmem_getpage_gfp+0x8eb/0x2120 [ 1097.016889][T27521] shmem_write_begin+0xce/0x1b0 [ 1097.021769][T27521] generic_perform_write+0x2ce/0x540 [ 1097.027067][T27521] ? atime_needs_update+0x5b0/0x5b0 [ 1097.032287][T27521] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1097.038126][T27521] ? file_remove_privs+0x5b0/0x5b0 [ 1097.043266][T27521] ? __kasan_check_write+0x14/0x20 [ 1097.048481][T27521] ? down_write+0xb2/0x120 [ 1097.052919][T27521] __generic_file_write_iter+0x24b/0x480 [ 1097.058570][T27521] ? generic_write_checks+0x3d4/0x480 [ 1097.063968][T27521] generic_file_write_iter+0xa9/0x1d0 [ 1097.069358][T27521] __kernel_write+0x535/0x910 [ 1097.074043][T27521] ? vfs_read+0xa60/0xa60 [ 1097.078386][T27521] ? down_read_killable+0x82/0xe0 [ 1097.083454][T27521] ? populate_vma_page_range+0xf0/0xf0 [ 1097.088937][T27521] ? cgroup_freezing+0x86/0xb0 [ 1097.093725][T27521] ? freezing_slow_path+0x10a/0x150 [ 1097.098944][T27521] dump_emit+0x246/0x370 [ 1097.103206][T27521] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 1097.108683][T27521] ? dump_user_range+0xd6/0x1a0 [ 1097.113545][T27521] dump_user_range+0x6a/0x1a0 [ 1097.118228][T27521] elf_core_dump+0x2866/0x2cc0 [ 1097.122999][T27521] ? load_elf_binary+0x28e0/0x28e0 [ 1097.128124][T27521] ? __fsnotify_parent+0x6db/0x7c0 [ 1097.133256][T27521] ? do_truncate+0x1c6/0x240 [ 1097.137845][T27521] ? putname+0xfe/0x150 [ 1097.142007][T27521] ? __kasan_check_read+0x11/0x20 [ 1097.147041][T27521] ? cgroup_freezing+0x86/0xb0 [ 1097.151806][T27521] ? freezing_slow_path+0x10a/0x150 [ 1097.157008][T27521] do_coredump+0x1ba3/0x28e0 [ 1097.161611][T27521] ? simple_acl_create+0x1c0/0x1c0 [ 1097.166729][T27521] ? debug_smp_processor_id+0x17/0x20 [ 1097.172108][T27521] ? kmem_cache_free+0x100/0x2d0 [ 1097.177051][T27521] ? ____kasan_slab_free+0x130/0x160 [ 1097.182338][T27521] ? get_signal+0xb98/0x12e0 [ 1097.186926][T27521] ? kmem_cache_free+0x100/0x2d0 [ 1097.191870][T27521] get_signal+0xf23/0x12e0 [ 1097.196297][T27521] arch_do_signal_or_restart+0xe2/0x11d0 [ 1097.201942][T27521] ? send_signal+0x3b1/0x590 [ 1097.206533][T27521] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 1097.212176][T27521] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1097.217988][T27521] ? force_sig+0xca/0x120 [ 1097.222317][T27521] ? send_sig+0x70/0x70 [ 1097.226474][T27521] exit_to_user_mode_loop+0xa2/0xe0 [ 1097.231674][T27521] exit_to_user_mode_prepare+0x76/0xa0 [ 1097.237138][T27521] irqentry_exit_to_user_mode+0x9/0x10 [ 1097.242595][T27521] irqentry_exit+0x12/0x60 [ 1097.247013][T27521] exc_general_protection+0x1ca/0x250 [ 1097.252390][T27521] ? debug_smp_processor_id+0x17/0x20 [ 1097.257768][T27521] ? asm_exc_general_protection+0x8/0x30 [ 1097.263408][T27521] asm_exc_general_protection+0x1e/0x30 [ 1097.268956][T27521] RIP: 0033:0x7fbb108aff81 [ 1097.273372][T27521] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1097.292988][T27521] RSP: 002b:00002000000000e0 EFLAGS: 00010217 [ 1097.299061][T27521] RAX: 0000000000000000 RBX: 00007fbb10b2a090 RCX: 00007fbb108aff79 [ 1097.307047][T27521] RDX: 0000200000000180 RSI: 00002000000000e0 RDI: 0000000004000000 [ 1097.315034][T27521] RBP: 00007fbb109467e0 R08: 0000200000000200 R09: 0000200000000200 [ 1097.323007][T27521] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 1097.330992][T27521] R13: 00007fbb10b2a128 R14: 00007fbb10b2a090 R15: 00007ffd75ae0e38 [ 1097.386392][T27521] memory: usage 307200kB, limit 307200kB, failcnt 32384 [ 1097.555441][T27521] memory+swap: usage 429628kB, limit 9007199254740988kB, failcnt 0 [ 1097.787076][T27521] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1098.060146][T27521] Memory cgroup stats for /syz2: [ 1098.060282][T27521] anon 405504 [ 1098.060282][T27521] file 311427072 [ 1098.060282][T27521] kernel_stack 0 [ 1098.060282][T27521] percpu 0 [ 1098.060282][T27521] sock 0 [ 1098.060282][T27521] shmem 311427072 [ 1098.060282][T27521] file_mapped 135168 [ 1098.060282][T27521] file_dirty 0 [ 1098.060282][T27521] file_writeback 0 [ 1098.060282][T27521] anon_thp 0 [ 1098.060282][T27521] inactive_anon 310734848 [ 1098.060282][T27521] active_anon 3649536 [ 1098.060282][T27521] inactive_file 61440 [ 1098.060282][T27521] active_file 0 [ 1098.060282][T27521] unevictable 0 [ 1098.060282][T27521] slab_reclaimable 0 [ 1098.060282][T27521] slab_unreclaimable 0 [ 1098.060282][T27521] slab 0 [ 1098.060282][T27521] workingset_refault_anon 0 [ 1098.060282][T27521] workingset_refault_file 17193 [ 1098.060282][T27521] workingset_activate_anon 0 [ 1098.060282][T27521] workingset_activate_file 9702 [ 1098.060282][T27521] workingset_restore_anon 0 [ 1098.060282][T27521] workingset_restore_file 7095 [ 1098.292827][T27521] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27531,uid=0 [ 1098.308912][T27521] Memory cgroup out of memory: Killed process 27531 (syz.2.17389) total-vm:90436kB, anon-rss:1228kB, file-rss:38484kB, shmem-rss:0kB, UID:0 pgtables:184kB oom_score_adj:1000 [ 1098.747168][T27536] syz.2.17389 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1099.087350][T28184] device syzkaller0 entered promiscuous mode [ 1099.206788][T27536] CPU: 1 PID: 27536 Comm: syz.2.17389 Tainted: G W syzkaller #0 [ 1099.215763][T27536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1099.225842][T27536] Call Trace: [ 1099.229167][T27536] __dump_stack+0x21/0x24 [ 1099.233524][T27536] dump_stack_lvl+0x1a7/0x208 [ 1099.238219][T27536] ? show_regs_print_info+0x18/0x18 [ 1099.243432][T27536] ? ___ratelimit+0x3de/0x560 [ 1099.248129][T27536] ? __kasan_check_write+0x14/0x20 [ 1099.253260][T27536] ? _raw_spin_lock+0x94/0xf0 [ 1099.257985][T27536] dump_stack+0x15/0x1c [ 1099.262163][T27536] dump_header+0xdd/0x650 [ 1099.266502][T27536] oom_kill_process+0x1fa/0x2c0 [ 1099.271370][T27536] out_of_memory+0x93f/0xd20 [ 1099.275978][T27536] ? unregister_oom_notifier+0x20/0x20 [ 1099.281458][T27536] ? mutex_lock_killable+0x92/0xf0 [ 1099.286581][T27536] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1099.293101][T27536] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1099.298662][T27536] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1099.304226][T27536] ? _raw_spin_trylock_bh+0x150/0x150 [ 1099.309605][T27536] ? _raw_spin_unlock+0x4d/0x70 [ 1099.314488][T27536] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1099.320054][T27536] try_charge+0xf69/0x1500 [ 1099.324512][T27536] ? __memcg_kmem_charge+0x150/0x150 [ 1099.329811][T27536] ? percpu_counter_add_batch+0x13c/0x160 [ 1099.335558][T27536] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1099.341118][T27536] __mem_cgroup_charge+0x14c/0x6d0 [ 1099.346259][T27536] shmem_add_to_page_cache+0x574/0xe30 [ 1099.351738][T27536] ? shmem_alloc_page+0x380/0x380 [ 1099.356786][T27536] ? find_lock_entry+0x4b/0x200 [ 1099.361655][T27536] shmem_getpage_gfp+0x8eb/0x2120 [ 1099.366968][T27536] shmem_write_begin+0xce/0x1b0 [ 1099.371833][T27536] generic_perform_write+0x2ce/0x540 [ 1099.377140][T27536] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1099.383004][T27536] ? file_remove_privs+0x5b0/0x5b0 [ 1099.388127][T27536] ? __kasan_check_write+0x14/0x20 [ 1099.393247][T27536] ? down_write+0xb2/0x120 [ 1099.397679][T27536] __generic_file_write_iter+0x24b/0x480 [ 1099.403330][T27536] ? generic_write_checks+0x3d4/0x480 [ 1099.408717][T27536] generic_file_write_iter+0xa9/0x1d0 [ 1099.414101][T27536] __kernel_write+0x535/0x910 [ 1099.418797][T27536] ? vfs_read+0xa60/0xa60 [ 1099.423139][T27536] ? populate_vma_page_range+0xf0/0xf0 [ 1099.428618][T27536] ? cgroup_freezing+0x86/0xb0 [ 1099.433400][T27536] ? freezing_slow_path+0x10a/0x150 [ 1099.439052][T27536] dump_emit+0x246/0x370 [ 1099.443320][T27536] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 1099.448803][T27536] dump_user_range+0x6a/0x1a0 [ 1099.453497][T27536] elf_core_dump+0x2866/0x2cc0 [ 1099.458283][T27536] ? load_elf_binary+0x28e0/0x28e0 [ 1099.463411][T27536] ? __fsnotify_parent+0x6db/0x7c0 [ 1099.468557][T27536] ? do_truncate+0x1c6/0x240 [ 1099.473165][T27536] ? putname+0xfe/0x150 [ 1099.477335][T27536] ? __kasan_check_read+0x11/0x20 [ 1099.482465][T27536] ? cgroup_freezing+0x86/0xb0 [ 1099.487254][T27536] ? freezing_slow_path+0x10a/0x150 [ 1099.492471][T27536] do_coredump+0x1ba3/0x28e0 [ 1099.497088][T27536] ? simple_acl_create+0x1c0/0x1c0 [ 1099.502225][T27536] ? debug_smp_processor_id+0x17/0x20 [ 1099.507617][T27536] ? kmem_cache_free+0x100/0x2d0 [ 1099.512567][T27536] ? ____kasan_slab_free+0x130/0x160 [ 1099.517878][T27536] ? get_signal+0xb98/0x12e0 [ 1099.522496][T27536] ? kmem_cache_free+0x100/0x2d0 [ 1099.527451][T27536] get_signal+0xf23/0x12e0 [ 1099.531893][T27536] arch_do_signal_or_restart+0xe2/0x11d0 [ 1099.537643][T27536] ? send_signal+0x3b1/0x590 [ 1099.542255][T27536] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 1099.547907][T27536] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1099.553742][T27536] ? force_sig+0xca/0x120 [ 1099.558102][T27536] ? send_sig+0x70/0x70 [ 1099.562279][T27536] exit_to_user_mode_loop+0xa2/0xe0 [ 1099.567515][T27536] exit_to_user_mode_prepare+0x76/0xa0 [ 1099.572996][T27536] irqentry_exit_to_user_mode+0x9/0x10 [ 1099.578478][T27536] irqentry_exit+0x12/0x60 [ 1099.582914][T27536] exc_general_protection+0x1ca/0x250 [ 1099.588317][T27536] ? debug_smp_processor_id+0x17/0x20 [ 1099.593720][T27536] ? asm_exc_general_protection+0x8/0x30 [ 1099.599387][T27536] asm_exc_general_protection+0x1e/0x30 [ 1099.604956][T27536] RIP: 0033:0x7fbb108aff81 [ 1099.609567][T27536] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1099.629331][T27536] RSP: 002b:00002000000000e0 EFLAGS: 00010217 [ 1099.635417][T27536] RAX: 0000000000000000 RBX: 00007fbb10b2a090 RCX: 00007fbb108aff79 [ 1099.643431][T27536] RDX: 0000200000000180 RSI: 00002000000000e0 RDI: 0000000004000000 [ 1099.651431][T27536] RBP: 00007fbb109467e0 R08: 0000200000000200 R09: 0000200000000200 [ 1099.659420][T27536] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 1099.667406][T27536] R13: 00007fbb10b2a128 R14: 00007fbb10b2a090 R15: 00007ffd75ae0e38 [ 1099.692405][T27536] memory: usage 305732kB, limit 307200kB, failcnt 35595 [ 1099.714473][T27536] memory+swap: usage 427088kB, limit 9007199254740988kB, failcnt 0 [ 1099.881798][T27536] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1099.912202][T27536] Memory cgroup stats for /syz2: [ 1099.913227][T27536] anon 405504 [ 1099.913227][T27536] file 311697408 [ 1099.913227][T27536] kernel_stack 0 [ 1099.913227][T27536] percpu 0 [ 1099.913227][T27536] sock 0 [ 1099.913227][T27536] shmem 311697408 [ 1099.913227][T27536] file_mapped 270336 [ 1099.913227][T27536] file_dirty 0 [ 1099.913227][T27536] file_writeback 0 [ 1099.913227][T27536] anon_thp 0 [ 1099.913227][T27536] inactive_anon 300855296 [ 1099.913227][T27536] active_anon 13381632 [ 1099.913227][T27536] inactive_file 110592 [ 1099.913227][T27536] active_file 0 [ 1099.913227][T27536] unevictable 0 [ 1099.913227][T27536] slab_reclaimable 0 [ 1099.913227][T27536] slab_unreclaimable 0 [ 1099.913227][T27536] slab 0 [ 1099.913227][T27536] workingset_refault_anon 0 [ 1099.913227][T27536] workingset_refault_file 19800 [ 1099.913227][T27536] workingset_activate_anon 0 [ 1099.913227][T27536] workingset_activate_file 10989 [ 1099.913227][T27536] workingset_restore_anon 0 [ 1099.913227][T27536] workingset_restore_file 7920 [ 1100.100033][T27536] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27550,uid=0 [ 1100.166409][T27536] Memory cgroup out of memory: Killed process 27550 (syz.2.17389) total-vm:90436kB, anon-rss:1228kB, file-rss:37712kB, shmem-rss:0kB, UID:0 pgtables:184kB oom_score_adj:1000 [ 1100.633876][T28203] device syzkaller0 entered promiscuous mode [ 1100.786963][T27547] syz.2.17389 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1100.898979][T27547] CPU: 1 PID: 27547 Comm: syz.2.17389 Tainted: G W syzkaller #0 [ 1100.907956][T27547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1100.918129][T27547] Call Trace: [ 1100.921437][T27547] __dump_stack+0x21/0x24 [ 1100.925785][T27547] dump_stack_lvl+0x1a7/0x208 [ 1100.930478][T27547] ? show_regs_print_info+0x18/0x18 [ 1100.935690][T27547] ? ___ratelimit+0x3de/0x560 [ 1100.940380][T27547] ? __kasan_check_write+0x14/0x20 [ 1100.945509][T27547] ? _raw_spin_lock+0x94/0xf0 [ 1100.950298][T27547] dump_stack+0x15/0x1c [ 1100.954489][T27547] dump_header+0xdd/0x650 [ 1100.958854][T27547] oom_kill_process+0x1fa/0x2c0 [ 1100.963722][T27547] out_of_memory+0x93f/0xd20 [ 1100.968332][T27547] ? unregister_oom_notifier+0x20/0x20 [ 1100.973808][T27547] ? mutex_lock_killable+0x92/0xf0 [ 1100.978944][T27547] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1100.985576][T27547] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1100.991158][T27547] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1100.996722][T27547] ? _raw_spin_trylock_bh+0x150/0x150 [ 1101.002097][T27547] ? _raw_spin_unlock+0x4d/0x70 [ 1101.006952][T27547] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1101.012489][T27547] try_charge+0xf69/0x1500 [ 1101.016899][T27547] ? __memcg_kmem_charge+0x150/0x150 [ 1101.022274][T27547] ? percpu_counter_add_batch+0x13c/0x160 [ 1101.028027][T27547] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1101.033561][T27547] __mem_cgroup_charge+0x14c/0x6d0 [ 1101.038683][T27547] shmem_add_to_page_cache+0x574/0xe30 [ 1101.044166][T27547] ? shmem_alloc_page+0x380/0x380 [ 1101.049215][T27547] ? _raw_spin_lock_irqsave+0x130/0x130 [ 1101.054782][T27547] ? find_lock_entry+0x4b/0x200 [ 1101.059656][T27547] shmem_getpage_gfp+0x8eb/0x2120 [ 1101.064718][T27547] shmem_write_begin+0xce/0x1b0 [ 1101.069590][T27547] generic_perform_write+0x2ce/0x540 [ 1101.074895][T27547] ? atime_needs_update+0x5b0/0x5b0 [ 1101.080117][T27547] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1101.086027][T27547] ? file_remove_privs+0x5b0/0x5b0 [ 1101.091170][T27547] ? __kasan_check_write+0x14/0x20 [ 1101.096329][T27547] ? down_write+0xb2/0x120 [ 1101.100770][T27547] __generic_file_write_iter+0x24b/0x480 [ 1101.106424][T27547] ? generic_write_checks+0x3d4/0x480 [ 1101.111811][T27547] generic_file_write_iter+0xa9/0x1d0 [ 1101.117218][T27547] __kernel_write+0x535/0x910 [ 1101.121919][T27547] ? vfs_read+0xa60/0xa60 [ 1101.126265][T27547] ? populate_vma_page_range+0xf0/0xf0 [ 1101.131747][T27547] ? cgroup_freezing+0x86/0xb0 [ 1101.136532][T27547] ? freezing_slow_path+0x10a/0x150 [ 1101.141754][T27547] dump_emit+0x246/0x370 [ 1101.146023][T27547] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 1101.151507][T27547] dump_user_range+0x6a/0x1a0 [ 1101.156214][T27547] elf_core_dump+0x2866/0x2cc0 [ 1101.161002][T27547] ? load_elf_binary+0x28e0/0x28e0 [ 1101.166127][T27547] ? __fsnotify_parent+0x6db/0x7c0 [ 1101.171266][T27547] ? do_truncate+0x1c6/0x240 [ 1101.175962][T27547] ? putname+0xfe/0x150 [ 1101.180224][T27547] ? __kasan_check_read+0x11/0x20 [ 1101.185273][T27547] ? cgroup_freezing+0x86/0xb0 [ 1101.190057][T27547] ? freezing_slow_path+0x10a/0x150 [ 1101.195284][T27547] do_coredump+0x1ba3/0x28e0 [ 1101.199897][T27547] ? simple_acl_create+0x1c0/0x1c0 [ 1101.205026][T27547] ? debug_smp_processor_id+0x17/0x20 [ 1101.210428][T27547] ? kmem_cache_free+0x100/0x2d0 [ 1101.215378][T27547] ? ____kasan_slab_free+0x130/0x160 [ 1101.220694][T27547] ? get_signal+0xb98/0x12e0 [ 1101.225297][T27547] ? kmem_cache_free+0x100/0x2d0 [ 1101.230251][T27547] get_signal+0xf23/0x12e0 [ 1101.234690][T27547] arch_do_signal_or_restart+0xe2/0x11d0 [ 1101.240361][T27547] ? send_signal+0x3b1/0x590 [ 1101.244974][T27547] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 1101.250623][T27547] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1101.256453][T27547] ? force_sig+0xca/0x120 [ 1101.260801][T27547] ? send_sig+0x70/0x70 [ 1101.264977][T27547] exit_to_user_mode_loop+0xa2/0xe0 [ 1101.270232][T27547] exit_to_user_mode_prepare+0x76/0xa0 [ 1101.275723][T27547] irqentry_exit_to_user_mode+0x9/0x10 [ 1101.281194][T27547] irqentry_exit+0x12/0x60 [ 1101.285622][T27547] exc_general_protection+0x1ca/0x250 [ 1101.291013][T27547] ? debug_smp_processor_id+0x17/0x20 [ 1101.296406][T27547] ? asm_exc_general_protection+0x8/0x30 [ 1101.302168][T27547] asm_exc_general_protection+0x1e/0x30 [ 1101.307740][T27547] RIP: 0033:0x7fbb108aff81 [ 1101.312187][T27547] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1101.331810][T27547] RSP: 002b:00002000000000e0 EFLAGS: 00010217 [ 1101.337892][T27547] RAX: 0000000000000000 RBX: 00007fbb10b2a090 RCX: 00007fbb108aff79 [ 1101.346062][T27547] RDX: 0000200000000180 RSI: 00002000000000e0 RDI: 0000000004000000 [ 1101.354142][T27547] RBP: 00007fbb109467e0 R08: 0000200000000200 R09: 0000200000000200 [ 1101.362128][T27547] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 1101.370276][T27547] R13: 00007fbb10b2a128 R14: 00007fbb10b2a090 R15: 00007ffd75ae0e38 [ 1101.382626][T27547] memory: usage 307200kB, limit 307200kB, failcnt 37671 [ 1101.389703][T27547] memory+swap: usage 430184kB, limit 9007199254740988kB, failcnt 0 [ 1101.397883][T27547] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1101.404844][T27547] Memory cgroup stats for /syz2: [ 1101.404983][T27547] anon 405504 [ 1101.404983][T27547] file 311967744 [ 1101.404983][T27547] kernel_stack 0 [ 1101.404983][T27547] percpu 0 [ 1101.404983][T27547] sock 0 [ 1101.404983][T27547] shmem 311832576 [ 1101.404983][T27547] file_mapped 135168 [ 1101.404983][T27547] file_dirty 0 [ 1101.404983][T27547] file_writeback 0 [ 1101.404983][T27547] anon_thp 0 [ 1101.404983][T27547] inactive_anon 300949504 [ 1101.404983][T27547] active_anon 13246464 [ 1101.404983][T27547] inactive_file 40960 [ 1101.404983][T27547] active_file 94208 [ 1101.404983][T27547] unevictable 0 [ 1101.404983][T27547] slab_reclaimable 0 [ 1101.404983][T27547] slab_unreclaimable 0 [ 1101.404983][T27547] slab 0 [ 1101.404983][T27547] workingset_refault_anon 0 [ 1101.404983][T27547] workingset_refault_file 20757 [ 1101.404983][T27547] workingset_activate_anon 0 [ 1101.404983][T27547] workingset_activate_file 11649 [ 1101.404983][T27547] workingset_restore_anon 0 [ 1101.404983][T27547] workingset_restore_file 8580 [ 1101.516038][T27547] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27522,uid=0 [ 1101.551599][T27547] Memory cgroup out of memory: Killed process 27522 (syz.2.17389) total-vm:90436kB, anon-rss:1228kB, file-rss:37512kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 1101.626305][T27517] syz.2.17389 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1101.709315][T27517] CPU: 1 PID: 27517 Comm: syz.2.17389 Tainted: G W syzkaller #0 [ 1101.718375][T27517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1101.728436][T27517] Call Trace: [ 1101.731733][T27517] __dump_stack+0x21/0x24 [ 1101.736061][T27517] dump_stack_lvl+0x1a7/0x208 [ 1101.740746][T27517] ? show_regs_print_info+0x18/0x18 [ 1101.745949][T27517] ? ___ratelimit+0x3de/0x560 [ 1101.750630][T27517] ? __kasan_check_write+0x14/0x20 [ 1101.755739][T27517] ? _raw_spin_lock+0x94/0xf0 [ 1101.760438][T27517] dump_stack+0x15/0x1c [ 1101.764607][T27517] dump_header+0xdd/0x650 [ 1101.768943][T27517] oom_kill_process+0x1fa/0x2c0 [ 1101.773920][T27517] out_of_memory+0x93f/0xd20 [ 1101.778603][T27517] ? unregister_oom_notifier+0x20/0x20 [ 1101.784064][T27517] ? mutex_lock_killable+0xdf/0xf0 [ 1101.789176][T27517] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1101.795690][T27517] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1101.801239][T27517] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1101.806801][T27517] ? _raw_spin_trylock_bh+0x150/0x150 [ 1101.812171][T27517] ? _raw_spin_unlock+0x4d/0x70 [ 1101.817028][T27517] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1101.822615][T27517] try_charge+0xf69/0x1500 [ 1101.827043][T27517] ? __memcg_kmem_charge+0x150/0x150 [ 1101.832434][T27517] ? percpu_counter_add_batch+0x13c/0x160 [ 1101.838419][T27517] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1101.844066][T27517] __mem_cgroup_charge+0x14c/0x6d0 [ 1101.849188][T27517] shmem_add_to_page_cache+0x574/0xe30 [ 1101.854649][T27517] ? shmem_alloc_page+0x380/0x380 [ 1101.859684][T27517] ? _raw_spin_lock_irqsave+0x130/0x130 [ 1101.865235][T27517] ? find_lock_entry+0x4b/0x200 [ 1101.870098][T27517] shmem_getpage_gfp+0x8eb/0x2120 [ 1101.875139][T27517] shmem_write_begin+0xce/0x1b0 [ 1101.879993][T27517] generic_perform_write+0x2ce/0x540 [ 1101.885285][T27517] ? atime_needs_update+0x5b0/0x5b0 [ 1101.890490][T27517] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1101.896302][T27517] ? file_remove_privs+0x5b0/0x5b0 [ 1101.901418][T27517] ? __kasan_check_write+0x14/0x20 [ 1101.906996][T27517] ? down_write+0xb2/0x120 [ 1101.911427][T27517] __generic_file_write_iter+0x24b/0x480 [ 1101.917065][T27517] ? generic_write_checks+0x3d4/0x480 [ 1101.922447][T27517] generic_file_write_iter+0xa9/0x1d0 [ 1101.927855][T27517] __kernel_write+0x535/0x910 [ 1101.932540][T27517] ? vfs_read+0xa60/0xa60 [ 1101.936877][T27517] ? irq_exit_rcu+0x9/0x10 [ 1101.941297][T27517] ? populate_vma_page_range+0xf0/0xf0 [ 1101.946760][T27517] ? cgroup_freezing+0x86/0xb0 [ 1101.951531][T27517] ? freezing_slow_path+0x10a/0x150 [ 1101.956763][T27517] dump_emit+0x246/0x370 [ 1101.961018][T27517] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 1101.966482][T27517] dump_user_range+0x6a/0x1a0 [ 1101.971165][T27517] elf_core_dump+0x2866/0x2cc0 [ 1101.975941][T27517] ? load_elf_binary+0x28e0/0x28e0 [ 1101.981148][T27517] ? __fsnotify_parent+0x6db/0x7c0 [ 1101.986360][T27517] ? do_truncate+0x1c6/0x240 [ 1101.990962][T27517] ? putname+0xfe/0x150 [ 1101.995121][T27517] ? __kasan_check_read+0x11/0x20 [ 1102.000155][T27517] ? cgroup_freezing+0x86/0xb0 [ 1102.004925][T27517] ? freezing_slow_path+0x10a/0x150 [ 1102.010133][T27517] do_coredump+0x1ba3/0x28e0 [ 1102.014748][T27517] ? simple_acl_create+0x1c0/0x1c0 [ 1102.019865][T27517] ? debug_smp_processor_id+0x17/0x20 [ 1102.025243][T27517] ? kmem_cache_free+0x100/0x2d0 [ 1102.030187][T27517] ? ____kasan_slab_free+0x130/0x160 [ 1102.035474][T27517] ? get_signal+0xb98/0x12e0 [ 1102.040073][T27517] ? kmem_cache_free+0x100/0x2d0 [ 1102.045020][T27517] get_signal+0xf23/0x12e0 [ 1102.049450][T27517] arch_do_signal_or_restart+0xe2/0x11d0 [ 1102.055084][T27517] ? send_signal+0x3b1/0x590 [ 1102.059677][T27517] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 1102.065323][T27517] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1102.071243][T27517] ? force_sig+0xca/0x120 [ 1102.075689][T27517] ? send_sig+0x70/0x70 [ 1102.079845][T27517] exit_to_user_mode_loop+0xa2/0xe0 [ 1102.085044][T27517] exit_to_user_mode_prepare+0x76/0xa0 [ 1102.090507][T27517] irqentry_exit_to_user_mode+0x9/0x10 [ 1102.095975][T27517] irqentry_exit+0x12/0x60 [ 1102.100390][T27517] exc_general_protection+0x1ca/0x250 [ 1102.105771][T27517] ? debug_smp_processor_id+0x17/0x20 [ 1102.111146][T27517] ? asm_exc_general_protection+0x8/0x30 [ 1102.116794][T27517] asm_exc_general_protection+0x1e/0x30 [ 1102.122344][T27517] RIP: 0033:0x7fbb108aff81 [ 1102.126771][T27517] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1102.146506][T27517] RSP: 002b:00002000000000e0 EFLAGS: 00010217 [ 1102.152582][T27517] RAX: 0000000000000000 RBX: 00007fbb10b2a090 RCX: 00007fbb108aff79 [ 1102.160566][T27517] RDX: 0000200000000180 RSI: 00002000000000e0 RDI: 0000000004000000 [ 1102.168539][T27517] RBP: 00007fbb109467e0 R08: 0000200000000200 R09: 0000200000000200 [ 1102.176513][T27517] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 1102.184677][T27517] R13: 00007fbb10b2a128 R14: 00007fbb10b2a090 R15: 00007ffd75ae0e38 [ 1102.567943][T28259] device veth1_macvtap left promiscuous mode [ 1102.935527][T27517] memory: usage 303036kB, limit 307200kB, failcnt 38728 [ 1102.952847][T27517] memory+swap: usage 425380kB, limit 9007199254740988kB, failcnt 0 [ 1102.972729][T27517] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1102.989882][T27517] Memory cgroup stats for /syz2: [ 1102.990029][T27517] anon 405504 [ 1102.990029][T27517] file 307101696 [ 1102.990029][T27517] kernel_stack 0 [ 1102.990029][T27517] percpu 0 [ 1102.990029][T27517] sock 0 [ 1102.990029][T27517] shmem 307101696 [ 1102.990029][T27517] file_mapped 135168 [ 1102.990029][T27517] file_dirty 0 [ 1102.990029][T27517] file_writeback 0 [ 1102.990029][T27517] anon_thp 0 [ 1102.990029][T27517] inactive_anon 298205184 [ 1102.990029][T27517] active_anon 12029952 [ 1102.990029][T27517] inactive_file 118784 [ 1102.990029][T27517] active_file 65536 [ 1102.990029][T27517] unevictable 0 [ 1102.990029][T27517] slab_reclaimable 0 [ 1102.990029][T27517] slab_unreclaimable 0 [ 1102.990029][T27517] slab 0 [ 1102.990029][T27517] workingset_refault_anon 0 [ 1102.990029][T27517] workingset_refault_file 20988 [ 1102.990029][T27517] workingset_activate_anon 0 [ 1102.990029][T27517] workingset_activate_file 11880 [ 1102.990029][T27517] workingset_restore_anon 0 [ 1102.990029][T27517] workingset_restore_file 8646 [ 1103.293998][T27517] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27536,uid=0 [ 1103.326499][T27517] Memory cgroup out of memory: Killed process 27536 (syz.2.17389) total-vm:90436kB, anon-rss:1228kB, file-rss:37212kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 1103.347461][ T27] oom_reaper: reaped process 27536 (syz.2.17389), now anon-rss:0kB, file-rss:37148kB, shmem-rss:0kB [ 1103.379469][T27521] syz.2.17389 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1103.465973][T27521] CPU: 0 PID: 27521 Comm: syz.2.17389 Tainted: G W syzkaller #0 [ 1103.474965][T27521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1103.485112][T27521] Call Trace: [ 1103.488414][T27521] __dump_stack+0x21/0x24 [ 1103.492749][T27521] dump_stack_lvl+0x1a7/0x208 [ 1103.497435][T27521] ? show_regs_print_info+0x18/0x18 [ 1103.502652][T27521] ? ___ratelimit+0x3de/0x560 [ 1103.507331][T27521] ? _raw_spin_lock+0x94/0xf0 [ 1103.512015][T27521] dump_stack+0x15/0x1c [ 1103.516176][T27521] dump_header+0xdd/0x650 [ 1103.520511][T27521] oom_kill_process+0x1fa/0x2c0 [ 1103.525463][T27521] out_of_memory+0x93f/0xd20 [ 1103.530083][T27521] ? unregister_oom_notifier+0x20/0x20 [ 1103.535544][T27521] ? mutex_lock_killable+0xdf/0xf0 [ 1103.540669][T27521] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1103.547173][T27521] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 1103.552718][T27521] ? mem_cgroup_oom_trylock+0x350/0x350 [ 1103.558385][T27521] ? _raw_spin_trylock_bh+0x150/0x150 [ 1103.563763][T27521] ? _raw_spin_unlock+0x4d/0x70 [ 1103.568628][T27521] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 1103.574177][T27521] try_charge+0xf69/0x1500 [ 1103.578602][T27521] ? __memcg_kmem_charge+0x150/0x150 [ 1103.583891][T27521] ? percpu_counter_add_batch+0x13c/0x160 [ 1103.589614][T27521] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1103.595627][T27521] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 1103.601179][T27521] __mem_cgroup_charge+0x14c/0x6d0 [ 1103.606293][T27521] shmem_add_to_page_cache+0x574/0xe30 [ 1103.611756][T27521] ? shmem_alloc_page+0x380/0x380 [ 1103.616787][T27521] ? _raw_spin_lock_irqsave+0x130/0x130 [ 1103.622335][T27521] ? find_lock_entry+0x4b/0x200 [ 1103.627202][T27521] shmem_getpage_gfp+0x8eb/0x2120 [ 1103.632271][T27521] shmem_write_begin+0xce/0x1b0 [ 1103.637147][T27521] generic_perform_write+0x2ce/0x540 [ 1103.642438][T27521] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1103.648246][T27521] ? file_remove_privs+0x5b0/0x5b0 [ 1103.653375][T27521] ? __kasan_check_write+0x14/0x20 [ 1103.658489][T27521] ? down_write+0xb2/0x120 [ 1103.662909][T27521] __generic_file_write_iter+0x24b/0x480 [ 1103.668561][T27521] ? generic_write_checks+0x3d4/0x480 [ 1103.673954][T27521] generic_file_write_iter+0xa9/0x1d0 [ 1103.679325][T27521] __kernel_write+0x535/0x910 [ 1103.684005][T27521] ? vfs_read+0xa60/0xa60 [ 1103.688339][T27521] ? populate_vma_page_range+0xf0/0xf0 [ 1103.693804][T27521] ? cgroup_freezing+0x86/0xb0 [ 1103.698565][T27521] ? freezing_slow_path+0x10a/0x150 [ 1103.703762][T27521] dump_emit+0x246/0x370 [ 1103.708006][T27521] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 1103.713463][T27521] ? dump_user_range+0xd6/0x1a0 [ 1103.718316][T27521] dump_user_range+0x6a/0x1a0 [ 1103.723081][T27521] elf_core_dump+0x2866/0x2cc0 [ 1103.727853][T27521] ? load_elf_binary+0x28e0/0x28e0 [ 1103.732968][T27521] ? __fsnotify_parent+0x6db/0x7c0 [ 1103.738092][T27521] ? do_truncate+0x1c6/0x240 [ 1103.742680][T27521] ? putname+0xfe/0x150 [ 1103.746841][T27521] ? __kasan_check_read+0x11/0x20 [ 1103.751876][T27521] ? cgroup_freezing+0x86/0xb0 [ 1103.756643][T27521] ? freezing_slow_path+0x10a/0x150 [ 1103.761851][T27521] do_coredump+0x1ba3/0x28e0 [ 1103.766456][T27521] ? simple_acl_create+0x1c0/0x1c0 [ 1103.771572][T27521] ? debug_smp_processor_id+0x17/0x20 [ 1103.776957][T27521] ? kmem_cache_free+0x100/0x2d0 [ 1103.781898][T27521] ? ____kasan_slab_free+0x130/0x160 [ 1103.787212][T27521] ? get_signal+0xb98/0x12e0 [ 1103.791807][T27521] ? kmem_cache_free+0x100/0x2d0 [ 1103.796749][T27521] get_signal+0xf23/0x12e0 [ 1103.801173][T27521] arch_do_signal_or_restart+0xe2/0x11d0 [ 1103.806810][T27521] ? send_signal+0x3b1/0x590 [ 1103.811408][T27521] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 1103.817040][T27521] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1103.822945][T27521] ? force_sig+0xca/0x120 [ 1103.827274][T27521] ? send_sig+0x70/0x70 [ 1103.831430][T27521] exit_to_user_mode_loop+0xa2/0xe0 [ 1103.836631][T27521] exit_to_user_mode_prepare+0x76/0xa0 [ 1103.842099][T27521] irqentry_exit_to_user_mode+0x9/0x10 [ 1103.847683][T27521] irqentry_exit+0x12/0x60 [ 1103.852099][T27521] exc_general_protection+0x1ca/0x250 [ 1103.857477][T27521] ? debug_smp_processor_id+0x17/0x20 [ 1103.862869][T27521] ? asm_exc_general_protection+0x8/0x30 [ 1103.868503][T27521] asm_exc_general_protection+0x1e/0x30 [ 1103.874045][T27521] RIP: 0033:0x7fbb108aff81 [ 1103.878464][T27521] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1103.898067][T27521] RSP: 002b:00002000000000e0 EFLAGS: 00010217 [ 1103.904227][T27521] RAX: 0000000000000000 RBX: 00007fbb10b2a090 RCX: 00007fbb108aff79 [ 1103.912200][T27521] RDX: 0000200000000180 RSI: 00002000000000e0 RDI: 0000000004000000 [ 1103.920172][T27521] RBP: 00007fbb109467e0 R08: 0000200000000200 R09: 0000200000000200 [ 1103.928148][T27521] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 1103.936126][T27521] R13: 00007fbb10b2a128 R14: 00007fbb10b2a090 R15: 00007ffd75ae0e38 [ 1104.008516][T27521] memory: usage 306140kB, limit 307200kB, failcnt 38924 [ 1104.015652][T27521] memory+swap: usage 425204kB, limit 9007199254740988kB, failcnt 0 [ 1104.033972][T27521] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1104.082937][T27521] Memory cgroup stats for /syz2: [ 1104.083082][T27521] anon 270336 [ 1104.083082][T27521] file 311697408 [ 1104.083082][T27521] kernel_stack 0 [ 1104.083082][T27521] percpu 0 [ 1104.083082][T27521] sock 0 [ 1104.083082][T27521] shmem 311832576 [ 1104.083082][T27521] file_mapped 135168 [ 1104.083082][T27521] file_dirty 0 [ 1104.083082][T27521] file_writeback 135168 [ 1104.083082][T27521] anon_thp 0 [ 1104.083082][T27521] inactive_anon 302800896 [ 1104.083082][T27521] active_anon 11759616 [ 1104.083082][T27521] inactive_file 118784 [ 1104.083082][T27521] active_file 65536 [ 1104.083082][T27521] unevictable 0 [ 1104.083082][T27521] slab_reclaimable 0 [ 1104.083082][T27521] slab_unreclaimable 0 [ 1104.083082][T27521] slab 0 [ 1104.083082][T27521] workingset_refault_anon 0 [ 1104.083082][T27521] workingset_refault_file 20988 [ 1104.083082][T27521] workingset_activate_anon 0 [ 1104.083082][T27521] workingset_activate_file 11880 [ 1104.083082][T27521] workingset_restore_anon 0 [ 1104.083082][T27521] workingset_restore_file 8646 [ 1104.211496][T27521] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.17389,pid=27547,uid=0 [ 1104.291490][T27521] Memory cgroup out of memory: Killed process 27547 (syz.2.17389) total-vm:90436kB, anon-rss:1228kB, file-rss:37464kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 1105.655427][T28336] device syzkaller0 entered promiscuous mode [ 1106.480206][T28373] : renamed from veth0_vlan [ 1106.666369][T28376] device syzkaller0 entered promiscuous mode [ 1107.041063][T28384] device syzkaller0 entered promiscuous mode [ 1107.948083][T28422] device syzkaller0 entered promiscuous mode [ 1109.087404][T28469] device syzkaller0 entered promiscuous mode [ 1109.307480][T28506] device syzkaller0 entered promiscuous mode [ 1109.611205][T28530] device syzkaller0 entered promiscuous mode [ 1110.401993][T28555] device syzkaller0 entered promiscuous mode [ 1110.600915][T28562] device syzkaller0 entered promiscuous mode [ 1110.670784][T28562] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1110.676720][T28562] syzkaller0: Linktype set failed because interface is up [ 1110.688385][T27165] syzkaller0: tun_net_xmit 48 [ 1111.386819][T28581] @aaaaaaaaa: renamed from bond_slave_0 [ 1111.973044][T28640] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 1112.520315][T28666] device syzkaller0 entered promiscuous mode [ 1113.228916][T28742] device syzkaller0 entered promiscuous mode [ 1113.238416][T28745] device veth1_macvtap left promiscuous mode [ 1113.244453][T28745] device macsec0 left promiscuous mode [ 1116.398500][T28893] device syzkaller0 entered promiscuous mode [ 1116.468896][T28895] device syzkaller0 entered promiscuous mode [ 1117.489149][T28950] @: renamed from bond_slave_0 [ 1119.654363][T29098] device veth0_vlan left promiscuous mode [ 1119.689697][T29098] device veth0_vlan entered promiscuous mode [ 1119.746615][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1119.776705][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1119.856368][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1120.015673][T29127] syz.0.17857[29127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1120.015740][T29127] syz.0.17857[29127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1120.362166][T29137] device syzkaller0 entered promiscuous mode [ 1120.641149][T29162] device veth1_macvtap left promiscuous mode [ 1125.185703][T29480] syz.5.17967[29480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1125.185760][T29480] syz.5.17967[29480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1128.866923][T29611] : port 2(veth0_to_team) entered blocking state [ 1128.885188][T29611] : port 2(veth0_to_team) entered disabled state [ 1128.892513][T29611] device veth0_to_team entered promiscuous mode [ 1129.146587][T29635] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 1131.255366][T29764] device syzkaller0 entered promiscuous mode [ 1131.455716][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1131.464545][T11709] syzkaller0: tun_net_xmit 76 [ 1131.472637][T11709] syzkaller0: tun_net_xmit 48 [ 1131.486029][ C1] syzkaller0: tun_net_xmit 76 [ 1131.921645][T29854] device syzkaller0 entered promiscuous mode [ 1131.976042][ C0] syzkaller0: tun_net_xmit 76 [ 1133.006978][T29920] device syzkaller0 entered promiscuous mode [ 1134.687798][T30029] device syzkaller0 left promiscuous mode [ 1134.850975][T30049] device pim6reg1 entered promiscuous mode [ 1134.910816][T30054] : port 1(ip6gretap0) entered blocking state [ 1134.924186][T30054] : port 1(ip6gretap0) entered disabled state [ 1134.931538][T30054] device ip6gretap0 entered promiscuous mode [ 1135.143786][T30080] tap1: tun_chr_ioctl cmd 2147767521 [ 1135.188857][T30080] +: renamed from team_slave_1 [ 1135.309862][T30094] device syzkaller0 entered promiscuous mode [ 1136.074659][T30164] device syzkaller0 entered promiscuous mode [ 1137.456588][T30242] device syzkaller0 entered promiscuous mode [ 1137.687372][T30278] device veth1_macvtap entered promiscuous mode [ 1137.714079][T30278] device macsec0 entered promiscuous mode [ 1137.724798][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1137.778114][T30279] device sit0 left promiscuous mode [ 1137.827957][T30279] device sit0 entered promiscuous mode [ 1138.806380][ C1] syzkaller0: tun_net_xmit 76 [ 1141.007476][T30489] GPL: mtu less than device minimum [ 1141.391803][T30528] device syzkaller0 entered promiscuous mode [ 1141.969335][T30557] syz.3.18277[30557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1141.969406][T30557] syz.3.18277[30557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1144.257893][T30695] device syzkaller0 entered promiscuous mode [ 1144.625442][T30721] bridge0: port 4(gretap0) entered blocking state [ 1144.632416][T30721] bridge0: port 4(gretap0) entered disabled state [ 1144.654679][T30721] device gretap0 entered promiscuous mode [ 1145.536352][ C0] syzkaller0: tun_net_xmit 76 [ 1146.326039][ C0] syzkaller0: tun_net_xmit 48 [ 1146.842082][T30806] bridge0: port 1(bridge_slave_0) entered blocking state [ 1146.849281][T30806] bridge0: port 1(bridge_slave_0) entered disabled state [ 1146.857157][T30806] device bridge_slave_0 entered promiscuous mode [ 1146.864471][T30806] bridge0: port 2(bridge_slave_1) entered blocking state [ 1146.871592][T30806] bridge0: port 2(bridge_slave_1) entered disabled state [ 1146.879204][T30806] device bridge_slave_1 entered promiscuous mode [ 1147.306555][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1147.351801][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1147.436319][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1147.447917][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1147.466158][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 1147.473231][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1147.486447][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1147.501532][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1147.518613][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 1147.525666][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1147.629072][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1147.676779][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1147.710640][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1147.739632][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1147.753307][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1147.788370][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1147.805101][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1147.834510][T30806] device veth0_vlan entered promiscuous mode [ 1147.848645][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1147.864284][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1147.902287][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1147.909918][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1147.939325][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1147.947607][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1147.991784][T30806] device veth1_macvtap entered promiscuous mode [ 1148.047072][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1148.054978][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1148.083839][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1148.104975][ T49] device ip6gretap0 left promiscuous mode [ 1148.112720][ T49] : port 1(ip6gretap0) entered disabled state [ 1148.171332][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1148.181138][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1148.476660][T30922] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 1148.482658][T30922] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 1148.962335][ T49] device veth1_macvtap left promiscuous mode [ 1148.975144][ T49] device veth0_vlan left promiscuous mode [ 1149.586227][T30999] device syzkaller0 entered promiscuous mode [ 1150.467748][T31037] tap0: tun_chr_ioctl cmd 1074812118 [ 1150.628523][T31052] device syzkaller0 left promiscuous mode [ 1150.831426][T31073] device bond_slave_1 entered promiscuous mode [ 1150.876499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 1150.894940][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1151.980984][T31161] device syzkaller0 entered promiscuous mode [ 1152.319701][T31195] device syzkaller0 left promiscuous mode [ 1152.397859][T31204] device syzkaller0 entered promiscuous mode [ 1153.141853][T31271] device veth1_macvtap entered promiscuous mode [ 1153.149347][T31271] device macsec0 entered promiscuous mode [ 1153.174853][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1153.279319][T31284] device sit0 left promiscuous mode [ 1153.785745][T31319] device syzkaller0 left promiscuous mode [ 1156.049705][T31436] device syzkaller0 entered promiscuous mode [ 1158.039261][T31576] device syzkaller0 entered promiscuous mode [ 1160.141670][T31678] device pim6reg1 entered promiscuous mode [ 1160.148311][T31677] device veth1_macvtap entered promiscuous mode [ 1160.156164][T31677] device macsec0 entered promiscuous mode [ 1160.162738][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1161.178600][T31756] batadv0: tun_chr_ioctl cmd 1074025684 [ 1163.121744][T31817] bridge0: port 1(bridge_slave_0) entered blocking state [ 1163.131427][T31817] bridge0: port 1(bridge_slave_0) entered disabled state [ 1163.146457][T31817] device bridge_slave_0 entered promiscuous mode [ 1163.247414][T31817] bridge0: port 2(bridge_slave_1) entered blocking state [ 1163.254534][T31817] bridge0: port 2(bridge_slave_1) entered disabled state [ 1163.262279][T31817] device bridge_slave_1 entered promiscuous mode [ 1163.828242][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1163.849240][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1163.884185][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1163.906277][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1163.975669][T18567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1163.982773][T18567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1164.063709][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1164.106883][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1164.146224][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1164.196046][T18567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1164.203125][T18567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1164.310974][T31817] device veth0_vlan entered promiscuous mode [ 1164.380152][T31874] device syzkaller0 entered promiscuous mode [ 1164.423135][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1164.439535][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1164.473535][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1164.502512][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1164.531104][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1164.559293][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1164.582627][T31817] device veth1_macvtap entered promiscuous mode [ 1164.664098][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1164.762188][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1164.774897][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1164.855549][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1164.876396][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1165.928617][ T49] device veth0_to_team left promiscuous mode [ 1165.934731][ T49] : port 2(veth0_to_team) entered disabled state [ 1165.975801][ T49] device vlan1 left promiscuous mode [ 1165.998849][ T49] : port 1(vlan1) entered disabled state [ 1166.042488][ T49] device veth1_macvtap left promiscuous mode [ 1166.241212][T31950] sock: sock_set_timeout: `syz.3.18690' (pid 31950) tries to set negative timeout [ 1166.553270][T31960] : renamed from vlan0 [ 1167.437419][T31988] : renamed from vlan1 [ 1168.097645][T32038] device syzkaller0 entered promiscuous mode [ 1168.139173][T32037] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1168.156274][T32037] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1168.176330][T32037] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1168.680495][T32099] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.706858][T32099] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.714460][T32099] device bridge_slave_0 entered promiscuous mode [ 1168.721840][T32099] bridge0: port 2(bridge_slave_1) entered blocking state [ 1168.730514][T32099] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.738309][T32099] device bridge_slave_1 entered promiscuous mode [ 1168.836518][T32099] bridge0: port 2(bridge_slave_1) entered blocking state [ 1168.843562][T32099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1168.850880][T32099] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.857910][T32099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1168.883831][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1168.896861][T18567] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.904273][T18567] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.932465][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1168.961767][T18567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.968865][T18567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1169.010345][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1169.018728][T18567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1169.025797][T18567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1169.059179][T32122] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 1169.083925][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1169.096868][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1169.130247][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1169.139193][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1169.151391][T32099] device veth0_vlan entered promiscuous mode [ 1169.163163][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1169.171579][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1169.180053][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1169.187692][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1169.199983][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1169.214584][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1169.223786][T32099] device veth1_macvtap entered promiscuous mode [ 1169.240725][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1169.248733][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1169.257347][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1169.313807][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1169.323540][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1169.392235][ T49] device ip6gretap0 left promiscuous mode [ 1169.399071][ T49] : port 1(ip6gretap0) entered disabled state [ 1170.346263][T32172] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.359750][T32172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.425204][T32172] device bridge_slave_0 entered promiscuous mode [ 1170.454233][T32172] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.461606][T32172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.476733][T32172] device bridge_slave_1 entered promiscuous mode [ 1170.583420][T32172] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.590524][T32172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1170.597842][T32172] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.604880][T32172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1170.643128][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1170.656335][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.667509][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.690643][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1170.720516][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.727613][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1170.736661][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1170.756522][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.763638][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1170.827406][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1170.850387][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1170.882674][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1171.058891][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1171.072640][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1171.102722][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1171.163035][T32215] device syzkaller0 entered promiscuous mode [ 1171.296927][T32172] device veth0_vlan entered promiscuous mode [ 1171.412310][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1171.429908][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1171.464578][T32172] device veth1_macvtap entered promiscuous mode [ 1171.530210][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1171.562772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1171.582392][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1171.617650][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1171.632519][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1171.836059][T32230] b7: renamed from team_slave_1 [ 1172.067920][T32243] device macsec0 entered promiscuous mode [ 1172.198179][T32251] device syzkaller0 entered promiscuous mode [ 1172.256797][ T49] device gretap0 left promiscuous mode [ 1172.266041][ T49] bridge0: port 4(gretap0) entered disabled state [ 1172.407637][T32264] bridge0: port 2(bridge_slave_1) entered disabled state [ 1172.416054][T32264] bridge0: port 1(bridge_slave_0) entered disabled state [ 1172.462485][T32265] device bridge_slave_1 left promiscuous mode [ 1172.476037][T32265] bridge0: port 2(bridge_slave_1) entered disabled state [ 1172.483470][T32265] device bridge_slave_0 left promiscuous mode [ 1172.496024][T32265] bridge0: port 1(bridge_slave_0) entered disabled state [ 1172.629746][ T49] device veth1 left promiscuous mode [ 1172.635154][ T49] bridge0: port 3(veth1) entered disabled state [ 1172.644280][ T49] device bridge_slave_1 left promiscuous mode [ 1172.652858][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 1172.663569][ T49] device bridge_slave_0 left promiscuous mode [ 1172.669827][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 1172.689990][ T49] device veth1_macvtap left promiscuous mode [ 1173.183753][T32289] device syzkaller0 entered promiscuous mode [ 1173.619800][T32310] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1173.625659][T32310] syzkaller0: linktype set to 805 [ 1174.231936][T32367] syz.2.18814[32367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1174.231993][T32367] syz.2.18814[32367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1174.451320][T32385] pimreg1: tun_chr_ioctl cmd 1074025692 [ 1174.619899][T32392] pimreg1: tun_chr_ioctl cmd 35108 [ 1174.860129][T32400] device syzkaller0 entered promiscuous mode [ 1178.401456][T32587] device veth1_macvtap left promiscuous mode [ 1178.763125][T32643] device veth1_macvtap left promiscuous mode [ 1178.770738][T32643] device macsec0 left promiscuous mode [ 1180.716726][ T316] device syzkaller0 entered promiscuous mode [ 1183.474184][ T449] device veth1_macvtap entered promiscuous mode [ 1183.481100][ T449] device macsec0 entered promiscuous mode [ 1183.533019][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1183.800338][ T477] device syzkaller0 entered promiscuous mode [ 1183.944114][ T544] syzkaller0: tun_net_xmit 48 [ 1183.977316][ T495] device syzkaller0 entered promiscuous mode [ 1183.985424][ T491] device veth1_macvtap left promiscuous mode [ 1184.249642][ T499] device wg2 entered promiscuous mode [ 1184.313690][ T517] device syzkaller0 entered promiscuous mode [ 1186.464375][ T618] bridge0: port 1(bridge_slave_0) entered disabled state [ 1186.534429][ T618] bridge0: port 1(bridge_slave_0) entered blocking state [ 1186.541547][ T618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1187.878917][ T692] device syzkaller0 entered promiscuous mode [ 1192.210996][ T930] device syzkaller0 entered promiscuous mode [ 1192.297091][ T950] bridge0: port 2(bridge_slave_1) entered disabled state [ 1192.304417][ T950] bridge0: port 1(bridge_slave_0) entered disabled state [ 1192.574598][ T956] device syzkaller0 entered promiscuous mode [ 1192.619891][ T2782] syzkaller0: tun_net_xmit 48 [ 1192.982707][ T989] device syzkaller0 entered promiscuous mode [ 1193.014277][ T993] syz.3.19140[993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1193.014344][ T993] syz.3.19140[993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1194.417491][ T1048] device syzkaller0 entered promiscuous mode [ 1195.229619][ T1097] device veth1_macvtap entered promiscuous mode [ 1195.236686][ T1097] device macsec0 entered promiscuous mode [ 1195.253728][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1195.480568][ T1138] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1195.497370][ T1138] syzkaller0: linktype set to 804 [ 1195.561490][ T1143] tun0: tun_chr_ioctl cmd 1074025676 [ 1195.572371][ T1143] tun0: owner set to 0 [ 1195.853408][ T1165] device syzkaller0 entered promiscuous mode [ 1196.148307][ T1179] device wg2 entered promiscuous mode [ 1197.158062][ T1253] device syzkaller0 entered promiscuous mode [ 1197.381769][ T1276] device syzkaller0 entered promiscuous mode [ 1197.388139][ T1276] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1198.010925][ T1321] bridge0: port 2(bridge_slave_1) entered disabled state [ 1198.018192][ T1321] bridge0: port 1(bridge_slave_0) entered disabled state [ 1198.124527][ T1325] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1198.137950][ T1325] device syzkaller0 entered promiscuous mode [ 1198.564491][ T1347] device syzkaller0 entered promiscuous mode [ 1198.869096][ T1360] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 1201.257062][ T1509] device syzkaller0 entered promiscuous mode [ 1201.304106][ T1508] device aaaaaaaaaaaaaaa entered promiscuous mode [ 1203.555459][ T1604] device sit0 entered promiscuous mode [ 1205.248043][ T1742] device syzkaller0 entered promiscuous mode [ 1205.318178][ T1748] bridge0: port 1(bridge_slave_0) entered disabled state [ 1206.497385][ T1844] : renamed from bond_slave_0 [ 1206.606482][ T1846] device syzkaller0 entered promiscuous mode [ 1207.497990][ T1873] device wg2 left promiscuous mode [ 1207.581122][ T1874] device syzkaller0 entered promiscuous mode [ 1209.934287][ T2009] -: renamed from syzkaller0 [ 1210.691231][ T2041] device syzkaller0 entered promiscuous mode [ 1211.284641][ T2061] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 1212.664150][ T2102] device syzkaller0 entered promiscuous mode [ 1213.170555][ T2132] device dummy0 entered promiscuous mode [ 1213.261461][ T2139] device wg2 left promiscuous mode [ 1213.596821][ T2150] : renamed from vlan0 [ 1213.724444][ T2153] device syzkaller0 entered promiscuous mode [ 1214.500088][ T2212] pimreg1: tun_chr_ioctl cmd 1074025692 [ 1215.465271][ T2280] device pim6reg1 entered promiscuous mode [ 1215.951875][ T2303] device syzkaller0 entered promiscuous mode [ 1216.661655][ T2391] geneve1: tun_chr_ioctl cmd 1074025672 [ 1216.672670][ T2391] geneve1: ignored: set checksum enabled [ 1218.213442][ T2468] device syzkaller0 entered promiscuous mode [ 1218.716985][ T2508] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 1218.842491][ T2507] device syzkaller0 entered promiscuous mode [ 1219.272648][ T2535] device syzkaller0 entered promiscuous mode [ 1220.997714][ T2621] device veth0_vlan left promiscuous mode [ 1221.022129][ T2621] device veth0_vlan entered promiscuous mode [ 1221.071687][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1221.086357][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1221.105502][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1221.388928][ T2656] device bridge0 entered promiscuous mode [ 1221.736388][ T2666] device veth1_macvtap left promiscuous mode [ 1221.798964][ T2666] device veth1_macvtap entered promiscuous mode [ 1221.816501][ T2666] device macsec0 entered promiscuous mode [ 1222.163282][ T2712] device veth1_macvtap left promiscuous mode [ 1222.189075][ T2712] device macsec0 left promiscuous mode [ 1222.287657][ T2712] device veth1_macvtap entered promiscuous mode [ 1222.306154][ T2712] device macsec0 entered promiscuous mode [ 1223.905687][ T2842] device syzkaller0 entered promiscuous mode [ 1225.140282][ T2922] device syzkaller0 entered promiscuous mode [ 1226.838233][ T3006] : renamed from vlan1 [ 1227.396589][ T3052] batadv0: tun_chr_ioctl cmd 1074025677 [ 1227.402192][ T3052] batadv0: linktype set to 776 [ 1227.420277][ T3052] batadv0: tun_chr_ioctl cmd 1074025675 [ 1227.426042][ T3052] batadv0: persist disabled [ 1227.629552][ T3060] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1227.676284][ T3060] syzkaller0: linktype set to 804 [ 1228.862816][ T3117] device syzkaller0 entered promiscuous mode [ 1229.826256][ T3184] device GPL entered promiscuous mode [ 1230.573673][ T3240] -1: renamed from syzkaller0 [ 1231.338009][ T3275] device syzkaller0 entered promiscuous mode [ 1231.376313][ T3275] syzkaller0: tun_net_xmit 1280 [ 1235.034064][ T3485] @: renamed from bond_slave_0 [ 1235.398715][ T3519] : renamed from vlan0 [ 1236.067599][ T3569] -: renamed from syzkaller0 [ 1237.324643][ T3643] device syzkaller0 entered promiscuous mode [ 1239.258273][ T3758] : port 1(ip6gretap0) entered blocking state [ 1239.286006][ T3758] : port 1(ip6gretap0) entered disabled state [ 1239.311392][ T3758] device ip6gretap0 entered promiscuous mode [ 1239.481284][ T3776] device veth1_macvtap left promiscuous mode [ 1239.890579][ T3782] device veth0_vlan left promiscuous mode [ 1239.957128][ T3782] device veth0_vlan entered promiscuous mode [ 1240.047915][ T3782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1240.065352][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1240.075530][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1240.095174][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1241.373279][ T3849] bY4`Ҙ: renamed from lo [ 1242.075286][ T3917] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.156022][ T3918] device bridge_slave_1 left promiscuous mode [ 1242.180408][ T3918] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.196400][ T3918] device bridge_slave_0 left promiscuous mode [ 1242.216026][ T3918] bridge0: port 1(bridge_slave_0) entered disabled state [ 1243.957773][ T4029] device vlan0 entered promiscuous mode [ 1243.967317][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1243.978600][ T4029] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1244.007928][ T4031] device syzkaller0 entered promiscuous mode [ 1245.006131][ T4089] device bridge_slave_1 left promiscuous mode [ 1245.044666][ T4089] bridge0: port 2(bridge_slave_1) entered disabled state [ 1245.160874][ T4089] bridge0: port 1(bridge_slave_0) entered disabled state [ 1245.521511][ T4100] device syzkaller0 entered promiscuous mode [ 1245.596605][ T4111] erspan0: refused to change device tx_queue_len [ 1246.256926][ T4164] device syzkaller0 entered promiscuous mode [ 1246.269880][ T4164] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1247.484086][ T4228] device syzkaller0 entered promiscuous mode [ 1251.803213][ T4503] device syzkaller0 entered promiscuous mode [ 1252.692085][ T4553] device syzkaller0 entered promiscuous mode [ 1257.337057][ T4894] erspan0: refused to change device tx_queue_len [ 1257.453024][ T4905] bY4`Ҙ: renamed from lo [ 1258.406307][ T5012] device syzkaller0 entered promiscuous mode [ 1259.134028][ T5051] batadv0: tun_chr_ioctl cmd 1074025677 [ 1259.145378][ T5051] batadv0: linktype set to 823 [ 1260.260706][ T5131] device syzkaller0 entered promiscuous mode [ 1261.229226][ T5154] device syzkaller0 entered promiscuous mode [ 1261.892976][ T5216] syz.3.20374[5216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1261.893033][ T5216] syz.3.20374[5216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1262.979505][ T5248] device syzkaller0 entered promiscuous mode [ 1263.027105][ T5283] device veth1_macvtap left promiscuous mode [ 1263.033174][ T5283] device macsec0 left promiscuous mode [ 1263.225098][ T5281] device veth0_vlan left promiscuous mode [ 1263.234391][ T5281] device veth0_vlan entered promiscuous mode [ 1263.268892][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1263.283817][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1263.296018][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1263.358880][ T5291] device syzkaller0 entered promiscuous mode [ 1263.548628][ T5328] device syzkaller0 entered promiscuous mode [ 1263.771638][ T5356] device syzkaller0 entered promiscuous mode [ 1264.078007][ T5360] device syzkaller0 left promiscuous mode [ 1264.804564][ T5426] device veth0_vlan left promiscuous mode [ 1264.818730][ T5426] device veth0_vlan entered promiscuous mode [ 1264.845635][ T5426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1264.871077][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1264.880236][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1264.888270][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1265.326687][ T5454] device syzkaller0 entered promiscuous mode [ 1265.456639][ T5463] syz.0.20445[5463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1265.456704][ T5463] syz.0.20445[5463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1265.970637][ T5489] device veth1_macvtap left promiscuous mode [ 1266.227685][ T5507] device syzkaller0 entered promiscuous mode [ 1266.427028][ T5515] device syzkaller0 entered promiscuous mode [ 1267.710276][ T5577] device veth0_vlan left promiscuous mode [ 1267.719571][ T5577] device veth0_vlan entered promiscuous mode [ 1267.738894][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1267.755105][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1267.781422][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1268.188561][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1268.237967][ T5645] +: renamed from team_slave_1 [ 1268.881012][ T5665] device syzkaller0 left promiscuous mode [ 1270.399207][ T5744] device bridge_slave_0 entered promiscuous mode [ 1271.228516][ T5757] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 1271.369104][ T5762] device syzkaller0 entered promiscuous mode [ 1271.692053][ T5771] device syzkaller0 entered promiscuous mode [ 1272.791290][ T5810] device syzkaller0 entered promiscuous mode [ 1274.731179][ T5905] device syzkaller0 entered promiscuous mode [ 1275.943877][ T5968] device syzkaller0 entered promiscuous mode [ 1277.540454][ T6030] device syzkaller0 entered promiscuous mode [ 1277.927823][ T6154] bridge0: port 1(bridge_slave_0) entered blocking state [ 1277.935036][ T6154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1277.942774][ T6154] device bridge_slave_0 entered promiscuous mode [ 1277.953541][ T6154] bridge0: port 2(bridge_slave_1) entered blocking state [ 1277.960919][ T6154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1277.968670][ T6154] device bridge_slave_1 entered promiscuous mode [ 1278.031757][ T6154] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.038951][ T6154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1278.046279][ T6154] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.053327][ T6154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1278.123063][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1278.133413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1278.147598][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.202531][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1278.227155][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.234223][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1278.256216][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1278.329476][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1278.350079][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1278.461155][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1278.486689][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1278.542238][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1278.578866][ T6154] device veth0_vlan entered promiscuous mode [ 1278.676095][ T6185] device sit0 entered promiscuous mode [ 1278.717127][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1278.725393][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1278.736415][ T6154] device veth1_macvtap entered promiscuous mode [ 1278.746398][ T6191] device veth1_macvtap left promiscuous mode [ 1278.752412][ T6191] device macsec0 left promiscuous mode [ 1278.785575][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1278.804143][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1278.827295][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1278.836134][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1278.853759][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1278.945303][ T6198] geneve1: tun_chr_ioctl cmd 1074025672 [ 1279.007090][ T6198] geneve1: ignored: set checksum enabled [ 1279.715554][ T6230] device syzkaller0 entered promiscuous mode [ 1280.227186][ T6253] device syzkaller0 entered promiscuous mode [ 1284.396992][ T6461] device syzkaller0 entered promiscuous mode [ 1285.389858][ T6538] syz.2.20718[6538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1285.389947][ T6538] syz.2.20718[6538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1285.596616][ T6547] syz.2.20718[6547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1285.685028][ T6547] syz.2.20718[6547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1286.718854][ T6580] device syzkaller0 entered promiscuous mode [ 1287.114294][ T6601] device syzkaller0 entered promiscuous mode [ 1287.145541][ T6603] device syzkaller0 entered promiscuous mode [ 1287.489595][ T6636] device wg2 entered promiscuous mode [ 1287.796770][ T6657] device syzkaller0 entered promiscuous mode [ 1287.804428][ T6662] IPv6: pim6reg1: Disabled Multicast RS [ 1288.631420][ T6747] device syzkaller0 entered promiscuous mode [ 1289.204398][ T6867] bridge0: port 1(bridge_slave_0) entered blocking state [ 1289.224764][ T6867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1289.232378][ T6867] device bridge_slave_0 entered promiscuous mode [ 1289.240554][ T6867] bridge0: port 2(bridge_slave_1) entered blocking state [ 1289.247722][ T6867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1289.255234][ T6867] device bridge_slave_1 entered promiscuous mode [ 1289.360039][ T6867] bridge0: port 2(bridge_slave_1) entered blocking state [ 1289.367132][ T6867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1289.374690][ T6867] bridge0: port 1(bridge_slave_0) entered blocking state [ 1289.381761][ T6867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1289.664465][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1289.676735][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 1289.711255][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 1289.779393][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1289.788531][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 1289.795634][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1289.803219][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1289.812002][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 1289.819102][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1289.834271][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1289.842391][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1289.861764][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1289.953091][ T6867] device veth0_vlan entered promiscuous mode [ 1289.960420][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1289.968847][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1289.992393][ T6867] device veth1_macvtap entered promiscuous mode [ 1290.003378][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1290.012439][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1290.020095][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1290.029310][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1290.043240][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1290.063074][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1290.078009][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1290.090229][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1290.098699][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1291.149074][T18452] bridge0: port 2(bridge_slave_1) entered disabled state [ 1291.176285][T18452] device bridge_slave_0 left promiscuous mode [ 1291.186430][T18452] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.006122][ T7076] tap0: tun_chr_ioctl cmd 1074025677 [ 1293.011456][ T7076] tap0: linktype set to 774 [ 1294.074017][ T7142] device syzkaller0 entered promiscuous mode [ 1294.439389][ T7151] device syzkaller0 entered promiscuous mode [ 1294.614239][ T7158] bridge0: port 2(bridge_slave_1) entered disabled state [ 1294.621508][ T7158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1294.901945][ T7171] device veth1_macvtap left promiscuous mode [ 1294.962277][ T7171] device veth1_macvtap entered promiscuous mode [ 1294.970132][ T7171] device macsec0 entered promiscuous mode [ 1295.825424][ T7196] device veth0_vlan left promiscuous mode [ 1295.842934][ T7196] device veth0_vlan entered promiscuous mode [ 1295.871806][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1295.894402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1295.914108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1296.060689][ T7202] batadv0: tun_chr_ioctl cmd 1074025677 [ 1296.066555][ T7202] batadv0: linktype set to 776 [ 1296.356400][ T7237] tap0: tun_chr_ioctl cmd 2147767521 [ 1298.024255][ T7361] device syzkaller0 entered promiscuous mode [ 1299.516298][ T7510] sock: sock_set_timeout: `syz.0.20976' (pid 7510) tries to set negative timeout [ 1300.834819][ T7581] device syzkaller0 entered promiscuous mode [ 1304.925089][ T7823] tap0: tun_chr_ioctl cmd 1074025677 [ 1304.932413][ T7823] tap0: linktype set to 7 [ 1306.152759][ T7867] device syzkaller0 entered promiscuous mode [ 1307.052455][ T7910] bridge0: port 3(gretap0) entered blocking state [ 1307.122902][ T7910] bridge0: port 3(gretap0) entered disabled state [ 1307.137756][ T7910] device gretap0 entered promiscuous mode [ 1307.143753][ T7910] bridge0: port 3(gretap0) entered blocking state [ 1307.150219][ T7910] bridge0: port 3(gretap0) entered forwarding state [ 1308.066294][ T7964] device veth1_macvtap left promiscuous mode [ 1308.136373][ T7964] device macsec0 left promiscuous mode [ 1309.259020][ T8017] bridge0: port 1(bridge_slave_0) entered disabled state [ 1309.455749][ T8037] device syzkaller0 entered promiscuous mode [ 1309.944459][ T8061] device syzkaller0 entered promiscuous mode [ 1311.141724][ T8132] device macsec0 entered promiscuous mode [ 1311.168474][ T8132] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1311.194435][ T8134] device syzkaller0 entered promiscuous mode [ 1312.535455][ T8215] device syzkaller0 entered promiscuous mode [ 1313.112650][ T8244] device veth0_vlan left promiscuous mode [ 1313.144069][ T8244] device veth0_vlan entered promiscuous mode [ 1313.216425][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1313.230093][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1313.276577][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1313.545407][ T8250] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.570915][ T8250] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.596284][ T8250] device bridge_slave_0 entered promiscuous mode [ 1313.618134][ T8250] bridge0: port 2(bridge_slave_1) entered blocking state [ 1313.625234][ T8250] bridge0: port 2(bridge_slave_1) entered disabled state [ 1313.646740][ T8250] device bridge_slave_1 entered promiscuous mode [ 1313.917362][ T8250] bridge0: port 2(bridge_slave_1) entered blocking state [ 1313.924442][ T8250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1313.931739][ T8250] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.938929][ T8250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1314.013952][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1314.026855][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1314.040031][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1314.083900][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1314.094300][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1314.103577][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1314.114386][ T8250] device veth0_vlan entered promiscuous mode [ 1314.140427][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1314.165821][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1314.190741][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1314.205528][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1314.214300][ T8250] device veth1_macvtap entered promiscuous mode [ 1314.267593][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1314.276936][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1316.619377][ T8422] device veth1_macvtap left promiscuous mode [ 1316.666839][ T8422] device macsec0 entered promiscuous mode [ 1318.371670][ T8494] device wg2 entered promiscuous mode [ 1320.174309][ T8616] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 1322.120876][ T8729] device syzkaller0 entered promiscuous mode [ 1322.567268][ T8785] device syzkaller0 entered promiscuous mode [ 1323.341976][ T8839] batadv0: tun_chr_ioctl cmd 1074025677 [ 1323.347889][ T8839] batadv0: linktype set to 776 [ 1323.589454][ T8855] device syzkaller0 entered promiscuous mode [ 1323.878909][ T8867] device veth1_macvtap left promiscuous mode [ 1323.895904][ T8867] device macsec0 left promiscuous mode [ 1323.989716][ T8876] : renamed from pim6reg1 [ 1324.054877][ T8881] device syzkaller0 entered promiscuous mode [ 1324.899439][ T8896] bridge0: port 1(bridge_slave_0) entered blocking state [ 1324.916255][ T8896] bridge0: port 1(bridge_slave_0) entered disabled state [ 1324.933977][ T8896] device bridge_slave_0 entered promiscuous mode [ 1324.962448][ T8896] bridge0: port 2(bridge_slave_1) entered blocking state [ 1324.996075][ T8896] bridge0: port 2(bridge_slave_1) entered disabled state [ 1325.019286][ T8896] device bridge_slave_1 entered promiscuous mode [ 1325.555010][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1325.571660][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1325.620017][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1325.640085][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1325.669935][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 1325.677131][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1325.723715][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1325.758554][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1325.791809][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 1325.799012][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1325.864409][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1325.906491][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1325.947247][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1326.009860][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1326.034638][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1326.074784][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1326.112822][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1326.140482][ T8896] device veth0_vlan entered promiscuous mode [ 1326.205136][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1326.223500][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1326.282716][ T8896] device veth1_macvtap entered promiscuous mode [ 1326.375798][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1326.396667][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1326.427038][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1326.506804][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1326.529534][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1326.634530][T18452] device ip6gretap0 left promiscuous mode [ 1326.648552][T18452] : port 1(ip6gretap0) entered disabled state [ 1327.257239][ T8976] device syzkaller0 entered promiscuous mode [ 1327.401222][ T8976] tap0: tun_chr_ioctl cmd 1074025677 [ 1327.412287][ T8976] tap0: linktype set to 270 [ 1327.612709][ T8996] device syzkaller0 entered promiscuous mode [ 1327.754449][T18452] device veth0_vlan left promiscuous mode [ 1328.529193][ T9045] device syzkaller0 entered promiscuous mode [ 1328.889837][ T9077] device sit0 entered promiscuous mode [ 1331.880954][ T9180] device syzkaller0 entered promiscuous mode [ 1333.329490][ T9235] bridge0: port 1(bridge_slave_0) entered disabled state [ 1334.762692][ T9289] device wg2 left promiscuous mode [ 1334.877671][ T9304] device veth1_macvtap left promiscuous mode [ 1334.944475][ T9308] device wg2 entered promiscuous mode [ 1335.026125][ T9308] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 1338.161874][ T9381] device bond_slave_1 entered promiscuous mode [ 1338.171153][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 1338.187892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1338.797595][ T9399] device syzkaller0 entered promiscuous mode [ 1339.589751][ T9446] device syzkaller0 entered promiscuous mode [ 1345.215829][ T9659] device macsec0 left promiscuous mode [ 1345.747060][ T9692] bridge0: port 2(bridge_slave_1) entered disabled state [ 1345.754312][ T9692] bridge0: port 1(bridge_slave_0) entered disabled state [ 1346.958995][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1346.988749][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 1346.995861][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1347.875124][ T9783] device syzkaller0 entered promiscuous mode [ 1349.708545][ T9887] device syzkaller0 entered promiscuous mode [ 1350.002753][ T9893] device xfrm0 entered promiscuous mode [ 1351.017871][ T9969] bridge0: port 1(bridge_slave_0) entered blocking state [ 1351.096079][ T9969] bridge0: port 1(bridge_slave_0) entered disabled state [ 1351.136457][ T9969] device bridge_slave_0 entered promiscuous mode [ 1351.184269][ T9969] bridge0: port 2(bridge_slave_1) entered blocking state [ 1351.244008][ T9969] bridge0: port 2(bridge_slave_1) entered disabled state [ 1351.278270][ T9969] device bridge_slave_1 entered promiscuous mode [ 1351.701327][ T9969] bridge0: port 2(bridge_slave_1) entered blocking state [ 1351.708434][ T9969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1351.715719][ T9969] bridge0: port 1(bridge_slave_0) entered blocking state [ 1351.722822][ T9969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1351.869126][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1351.878360][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 1351.888658][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 1351.903870][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1351.917930][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1351.927081][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 1351.934238][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1351.946180][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1351.988677][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1352.002753][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 1352.009922][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1352.040318][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1352.057386][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1352.066503][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1352.086634][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1352.112640][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1352.128709][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1352.146311][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1352.164405][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1352.221437][ T9969] device veth0_vlan entered promiscuous mode [ 1352.230370][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1352.238223][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1352.269693][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1352.296225][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1352.305349][ T9969] device veth1_macvtap entered promiscuous mode [ 1352.328319][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1352.347147][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1352.364576][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1352.397162][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1352.405556][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1352.487954][T10046] batadv0: tun_chr_ioctl cmd 1074812118 [ 1352.869576][T10065] device syzkaller0 entered promiscuous mode [ 1352.965523][T10083] : renamed from vlan1 [ 1353.454619][T10093] device wg2 entered promiscuous mode [ 1354.681711][T10218] device syzkaller0 entered promiscuous mode [ 1354.839871][T10222] : renamed from team_slave_1 [ 1356.213654][T10285] device veth1_macvtap left promiscuous mode [ 1356.649390][T10291] device syzkaller0 entered promiscuous mode [ 1357.924797][T10408] device syzkaller0 entered promiscuous mode [ 1360.727360][ C0] ip6_tunnel: GPL xmit: Local address not yet configured! [ 1363.483979][T10694] device pim6reg1 entered promiscuous mode [ 1364.588296][T10789] tap0: tun_chr_ioctl cmd 1074025677 [ 1364.593707][T10789] tap0: linktype set to 270 [ 1366.135516][T10893] device syzkaller0 entered promiscuous mode [ 1366.213064][T10901] device syzkaller0 entered promiscuous mode [ 1366.434542][T10905] device bond_slave_1 entered promiscuous mode [ 1366.455523][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 1366.469675][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1367.404008][T10950] device syzkaller0 entered promiscuous mode [ 1368.059546][T10968] : renamed from bond_slave_0 [ 1368.347368][T10969] bY4`Ҙ: renamed from lo [ 1368.849936][T11008] : renamed from veth0_vlan [ 1368.887408][T11010] device wg2 left promiscuous mode [ 1369.144947][T11024] 0: renamed from pim6reg1 [ 1370.223586][T11095] bridge0: port 1(bridge_slave_0) entered disabled state [ 1370.437580][T11121] device syzkaller0 entered promiscuous mode [ 1371.722061][T11216] batadv0: tun_chr_ioctl cmd 1074025684 [ 1371.922828][T11234] device syzkaller0 entered promiscuous mode [ 1372.278745][T11260] device syzkaller0 entered promiscuous mode [ 1372.291109][T11262] : renamed from pim6reg1 [ 1372.923058][T11286] device syzkaller0 entered promiscuous mode [ 1373.434936][T11288] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1374.580774][T11349] GPL: port 1(erspan0) entered blocking state [ 1374.587125][T11349] GPL: port 1(erspan0) entered disabled state [ 1374.623665][T11349] device erspan0 entered promiscuous mode [ 1374.656258][T11358] GPL: port 1(erspan0) entered blocking state [ 1374.662387][T11358] GPL: port 1(erspan0) entered forwarding state [ 1374.706542][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1374.714865][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 1374.721945][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1374.883435][T11375] device syzkaller0 entered promiscuous mode [ 1376.251496][T11459] device syzkaller0 entered promiscuous mode [ 1376.381418][T11474] device syzkaller0 entered promiscuous mode [ 1377.060909][T11519] device xfrm0 entered promiscuous mode [ 1377.384557][T11546] device syzkaller0 entered promiscuous mode [ 1378.442813][T11595] device syzkaller0 entered promiscuous mode [ 1378.668818][T11612] tun1: tun_chr_ioctl cmd 1074025678 [ 1378.685908][T11612] tun1: group set to 1 [ 1379.416570][T11650] device syzkaller0 entered promiscuous mode [ 1379.581850][T11654] device syzkaller0 left promiscuous mode [ 1382.331407][T11810] syz.0.22246[11810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1382.331472][T11810] syz.0.22246[11810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1382.864916][T11833] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 1382.916440][T11834] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 1383.981508][T11889] syz.6.22270[11889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1383.981569][T11889] syz.6.22270[11889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1384.615074][T11921] : renamed from bond_slave_0 [ 1387.947647][T12069] device syzkaller0 entered promiscuous mode [ 1389.266178][T12129] device syzkaller0 entered promiscuous mode [ 1389.998425][T12193] : renamed from team_slave_1 [ 1390.076796][T12208] : port 1(ip6gretap0) entered blocking state [ 1390.084868][T12208] : port 1(ip6gretap0) entered disabled state [ 1390.096581][T12208] device ip6gretap0 entered promiscuous mode [ 1390.125415][T12208] device ip6gretap0 left promiscuous mode [ 1390.141442][T12208] : port 1(ip6gretap0) entered disabled state [ 1390.277161][T12215] nr0: port 1(macsec0) entered blocking state [ 1390.359128][T12215] nr0: port 1(macsec0) entered disabled state [ 1390.549176][T12215] device macsec0 entered promiscuous mode [ 1390.783168][T12248] : renamed from pim6reg1 [ 1391.000595][T12267] device sit0 entered promiscuous mode [ 1391.875872][T12298] device syzkaller0 entered promiscuous mode [ 1392.079671][T12316] sock: sock_set_timeout: `syz.6.22393' (pid 12316) tries to set negative timeout [ 1392.148293][T12317] sock: sock_set_timeout: `syz.6.22393' (pid 12317) tries to set negative timeout [ 1393.377157][T12427] bridge0: port 2(bridge_slave_1) entered disabled state [ 1393.384397][T12427] bridge0: port 1(bridge_slave_0) entered disabled state [ 1395.064217][T12524] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 1395.353412][T12559] bridge0: port 3(gretap0) entered disabled state [ 1395.359946][T12559] bridge0: port 2(bridge_slave_1) entered disabled state [ 1395.367133][T12559] bridge0: port 1(bridge_slave_0) entered disabled state [ 1395.382274][T12560] device gretap0 left promiscuous mode [ 1395.389586][T12560] bridge0: port 3(gretap0) entered disabled state [ 1395.403400][T12560] device bridge_slave_1 left promiscuous mode [ 1395.411052][T12560] bridge0: port 2(bridge_slave_1) entered disabled state [ 1395.444907][T12560] bridge0: port 1(bridge_slave_0) entered disabled state [ 1395.694496][T12587] device syzkaller0 entered promiscuous mode [ 1395.772442][T12585] device sit0 left promiscuous mode [ 1395.914708][T12592] device sit0 entered promiscuous mode [ 1396.134243][T12611] : renamed from pim6reg1 [ 1396.241462][T12619] bridge0: port 2(bridge_slave_1) entered disabled state [ 1396.248694][T12619] bridge0: port 1(bridge_slave_0) entered disabled state [ 1396.397171][T12629] device syzkaller0 entered promiscuous mode [ 1397.380499][T12668] : port 1(ip6gretap0) entered blocking state [ 1397.402236][T12668] : port 1(ip6gretap0) entered disabled state [ 1397.477046][T12668] device ip6gretap0 entered promiscuous mode [ 1397.525176][T12670] device ip6gretap0 left promiscuous mode [ 1397.566017][T12670] : port 1(ip6gretap0) entered disabled state [ 1400.373688][T12836] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1400.387371][T12836] device syzkaller0 entered promiscuous mode [ 1400.584097][T12863] device syzkaller0 entered promiscuous mode [ 1401.799777][T12932] device syzkaller0 entered promiscuous mode [ 1401.996155][T12941] device syzkaller0 entered promiscuous mode [ 1404.773788][T13123] device syzkaller0 entered promiscuous mode [ 1405.854300][T13200] device syzkaller0 entered promiscuous mode [ 1406.986802][T13227] device syzkaller0 entered promiscuous mode [ 1407.497656][T13262] device syzkaller0 entered promiscuous mode [ 1409.227459][T13336] cgroup: fork rejected by pids controller in /syz6 [ 1409.953545][T13357] bridge0: port 1(bridge_slave_0) entered blocking state [ 1409.979170][T13357] bridge0: port 1(bridge_slave_0) entered disabled state [ 1409.987462][T13357] device bridge_slave_0 entered promiscuous mode [ 1410.022163][T13360] device syzkaller0 entered promiscuous mode [ 1410.028804][T13357] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.038820][T13357] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.056338][T13357] device bridge_slave_1 entered promiscuous mode [ 1410.153675][T13357] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.160780][T13357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1410.168094][T13357] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.175126][T13357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1410.207569][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1410.215449][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1410.227265][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.287001][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1410.295690][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.302806][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1410.342539][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1410.350903][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.357983][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1410.365692][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1410.373802][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1410.384503][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1410.432302][T13357] device veth0_vlan entered promiscuous mode [ 1410.446267][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1410.467323][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1410.478352][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1410.535210][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1410.582248][T18567] device bridge_slave_1 left promiscuous mode [ 1410.594469][T18567] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.642415][T18567] device bridge_slave_0 left promiscuous mode [ 1410.706196][T18567] bridge0: port 1(bridge_slave_0) entered disabled state [ 1410.733436][T18567] device veth0_vlan left promiscuous mode [ 1410.911301][T13357] device veth1_macvtap entered promiscuous mode [ 1410.964935][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1410.976456][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1411.075740][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1411.084661][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1411.864783][T13445] tap0: tun_chr_ioctl cmd 1074025677 [ 1411.882666][T13445] tap0: linktype set to 270 [ 1416.347501][T13667] device syzkaller0 entered promiscuous mode [ 1417.683364][T13736] device veth0_vlan left promiscuous mode [ 1417.713075][T13736] device veth0_vlan entered promiscuous mode [ 1418.015197][T13761] syz.0.22822[13761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1418.015255][T13761] syz.0.22822[13761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1418.846594][T13844] device syzkaller0 entered promiscuous mode [ 1419.810467][T13897] device syzkaller0 entered promiscuous mode [ 1419.960941][T13920] device syzkaller0 entered promiscuous mode [ 1420.827914][T13990] device syzkaller0 entered promiscuous mode [ 1421.122974][T14006] device wg2 left promiscuous mode [ 1421.622298][T14068] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1421.915044][T14089] syz.6.22922[14089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1421.915104][T14089] syz.6.22922[14089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1421.948344][T14089] : renamed from team_slave_1 [ 1422.724969][T14127] device bridge_slave_1 left promiscuous mode [ 1422.733464][T14127] bridge0: port 2(bridge_slave_1) entered disabled state [ 1422.768385][T14127] device bridge_slave_0 left promiscuous mode [ 1422.776408][T14127] bridge0: port 1(bridge_slave_0) entered disabled state [ 1423.005048][T14147] device syzkaller0 entered promiscuous mode [ 1423.147986][T14164] device sit0 entered promiscuous mode [ 1424.658980][T14247] device veth0_vlan left promiscuous mode [ 1424.776924][T14247] device veth0_vlan entered promiscuous mode [ 1424.889084][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1424.903105][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1424.921089][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1425.325138][T14282] device syzkaller0 entered promiscuous mode [ 1425.891532][T14320] device sit0 entered promiscuous mode [ 1426.106976][T14329] device syzkaller0 entered promiscuous mode [ 1426.764719][T14386] device veth0_vlan left promiscuous mode [ 1426.771199][T14386] device veth0_vlan entered promiscuous mode [ 1427.382362][T14424] device aaaaaaaaaaaaaaa entered promiscuous mode [ 1428.962885][T14502] device sit0 left promiscuous mode [ 1429.155458][T14511] device syzkaller0 entered promiscuous mode [ 1433.604586][T14690] device syzkaller0 entered promiscuous mode [ 1433.760600][T14674] device syzkaller0 entered promiscuous mode [ 1434.495155][T14715] device syzkaller0 entered promiscuous mode [ 1435.169962][T14766] device syzkaller0 entered promiscuous mode [ 1436.809739][T14859] device syzkaller0 entered promiscuous mode [ 1436.893571][T14868] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 1438.342175][T14943] device syzkaller0 entered promiscuous mode [ 1438.662735][T14969] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 1440.328740][T15012] -1: renamed from syzkaller0 [ 1440.725425][T15021] device syzkaller0 entered promiscuous mode [ 1448.121814][T15415] device syzkaller0 entered promiscuous mode [ 1448.403677][T15430] device veth0_vlan left promiscuous mode [ 1448.422252][T15430] device veth0_vlan entered promiscuous mode [ 1449.190119][T15521] syzkaller1: tun_chr_ioctl cmd 21731 [ 1449.200062][T15522] syzkaller1: tun_chr_ioctl cmd 21731 [ 1449.208884][T15521] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 1449.934744][T15570] : renamed from team_slave_1 [ 1450.169714][T15573] device syzkaller0 entered promiscuous mode [ 1450.521855][T15581] device macsec0 entered promiscuous mode [ 1451.540894][T15628] device sit0 left promiscuous mode [ 1451.601407][T15631] device sit0 entered promiscuous mode [ 1451.687425][T15634] device veth1_macvtap entered promiscuous mode [ 1451.694564][T15634] device macsec0 entered promiscuous mode [ 1451.721150][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1453.092395][T15706] device sit0 entered promiscuous mode [ 1458.193728][T15952] syz.2.23458[15952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1458.292796][T15962] device syzkaller0 entered promiscuous mode [ 1458.343463][T15962] syzkaller0: create flow: hash 2605526399 index 2 [ 1458.374361][T15962] syzkaller0: delete flow: hash 2605526399 index 2 [ 1460.471169][T16135] device syzkaller0 entered promiscuous mode [ 1460.569283][T16150] device syzkaller0 entered promiscuous mode [ 1461.043107][T16188] device syzkaller0 entered promiscuous mode [ 1461.286816][T16206] device veth1_macvtap entered promiscuous mode [ 1461.337205][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1464.403478][T16334] bridge0: port 1(bridge_slave_0) entered blocking state [ 1464.428934][T16334] bridge0: port 1(bridge_slave_0) entered disabled state [ 1464.439350][T16334] device bridge_slave_0 entered promiscuous mode [ 1464.528424][T16334] bridge0: port 2(bridge_slave_1) entered blocking state [ 1464.537640][T16334] bridge0: port 2(bridge_slave_1) entered disabled state [ 1464.553899][T16334] device bridge_slave_1 entered promiscuous mode [ 1465.103422][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1465.111184][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1465.172469][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1465.231754][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1465.262816][T18452] bridge0: port 1(bridge_slave_0) entered blocking state [ 1465.270001][T18452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1465.288315][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1465.296819][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1465.305153][T18452] bridge0: port 2(bridge_slave_1) entered blocking state [ 1465.312222][T18452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1465.319967][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1465.328349][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1465.340339][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1465.353186][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1465.361945][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1465.387930][T16334] device veth0_vlan entered promiscuous mode [ 1465.410476][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1465.448748][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1465.517839][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1465.526423][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1465.535358][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1465.546113][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1465.587518][T16334] device veth1_macvtap entered promiscuous mode [ 1465.595334][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1465.621267][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1465.630396][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1465.652507][T16388] device syzkaller0 entered promiscuous mode [ 1465.684751][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1465.703312][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1466.632330][T16457] device syzkaller0 entered promiscuous mode [ 1467.061634][ T306] device veth0_vlan left promiscuous mode [ 1467.411244][T16503] device syzkaller0 entered promiscuous mode [ 1467.503080][T16507] device syzkaller0 left promiscuous mode [ 1467.932773][T16527] device syzkaller0 entered promiscuous mode [ 1469.822596][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 1469.858741][T16634] device syzkaller0 entered promiscuous mode [ 1470.153109][T16666] device syzkaller0 entered promiscuous mode [ 1471.175719][T16728] -1: renamed from syzkaller0 [ 1471.522520][T16749] device syzkaller0 entered promiscuous mode [ 1471.976869][T16767] device syzkaller0 entered promiscuous mode [ 1472.175142][T16772] device syzkaller0 entered promiscuous mode [ 1472.287062][T16780] syz.6.23707[16780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.287127][T16780] syz.6.23707[16780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1473.728691][T16894] device syzkaller0 entered promiscuous mode [ 1474.257075][T16915] device veth0_vlan left promiscuous mode [ 1474.321287][T16915] device veth0_vlan entered promiscuous mode [ 1474.413695][T16919] device syzkaller0 entered promiscuous mode [ 1474.638099][T16932] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 1476.518227][T17009] device veth1_macvtap left promiscuous mode [ 1476.534480][T17009] device macsec0 entered promiscuous mode [ 1478.662314][T17142] @0: renamed from bond_slave_1 [ 1478.848873][T17164] syz.0.23821[17164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1478.848935][T17164] syz.0.23821[17164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1481.986728][T17285] device bond_slave_1 entered promiscuous mode [ 1482.005145][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 1482.014994][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1482.790298][T17318] device sit0 left promiscuous mode [ 1483.007787][T17326] device veth1_macvtap left promiscuous mode [ 1483.035886][T17326] device macsec0 entered promiscuous mode [ 1483.056280][T17325] device sit0 entered promiscuous mode [ 1483.421798][T17338] tap1: tun_chr_ioctl cmd 1074025677 [ 1483.435894][T17338] tap1: linktype set to 769 [ 1483.509465][T17338] device sit0 left promiscuous mode [ 1483.712754][T17349] device syzkaller0 entered promiscuous mode [ 1484.019576][T17381] device syzkaller0 entered promiscuous mode [ 1486.773886][T17536] device sit0 entered promiscuous mode [ 1486.889358][T17536] device syzkaller0 entered promiscuous mode [ 1487.098578][T17557] : renamed from vlan0 [ 1487.172067][T17555] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.192603][T17555] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.207455][T17555] device bridge_slave_0 entered promiscuous mode [ 1487.228740][T17555] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.237045][T17555] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.244567][T17555] device bridge_slave_1 entered promiscuous mode [ 1487.338750][T17555] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.345885][T17555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1487.353168][T17555] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.360349][T17555] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1487.394399][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1487.407748][T18567] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.416634][T18567] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.429121][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1487.447172][T18567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.454242][T18567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1487.491093][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1487.502746][T18567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.509849][T18567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1487.556941][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1487.608525][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1487.634789][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1487.650756][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1487.876389][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1487.895423][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1487.903545][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1487.928578][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1487.939210][T17555] device veth0_vlan entered promiscuous mode [ 1488.089500][T17603] device veth0_vlan left promiscuous mode [ 1488.135164][T17603] device veth0_vlan entered promiscuous mode [ 1488.249274][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1488.258509][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1488.293324][T17555] device veth1_macvtap entered promiscuous mode [ 1488.333328][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1488.366420][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1488.409444][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1488.423642][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1488.442479][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1489.300951][T18452] device bridge_slave_1 left promiscuous mode [ 1489.309448][T18452] bridge0: port 2(bridge_slave_1) entered disabled state [ 1489.324465][T18452] device bridge_slave_0 left promiscuous mode [ 1489.330807][T18452] bridge0: port 1(bridge_slave_0) entered disabled state [ 1489.345647][T18452] device veth0_vlan left promiscuous mode [ 1490.175113][T17738] syz.0.23978[17738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.175183][T17738] syz.0.23978[17738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.723866][T17754] device syzkaller0 entered promiscuous mode [ 1491.074003][T17799] device pim6reg1 entered promiscuous mode [ 1491.738559][T17851] bridge0: port 2(bridge_slave_1) entered disabled state [ 1491.746657][T17851] bridge0: port 1(bridge_slave_0) entered disabled state [ 1491.860554][T17855] device bridge_slave_1 left promiscuous mode [ 1491.880241][T17855] bridge0: port 2(bridge_slave_1) entered disabled state [ 1491.914172][T17855] device bridge_slave_0 left promiscuous mode [ 1491.946010][T17855] bridge0: port 1(bridge_slave_0) entered disabled state [ 1492.329961][T17870] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1492.339031][T17870] device syzkaller0 entered promiscuous mode [ 1492.625565][T17877] device syzkaller0 entered promiscuous mode [ 1492.714502][T17871] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.736370][T17871] bridge0: port 1(bridge_slave_0) entered disabled state [ 1492.743785][T17871] device bridge_slave_0 entered promiscuous mode [ 1492.753590][T17871] bridge0: port 2(bridge_slave_1) entered blocking state [ 1492.761070][T17871] bridge0: port 2(bridge_slave_1) entered disabled state [ 1492.776394][T17871] device bridge_slave_1 entered promiscuous mode [ 1492.995177][T17871] bridge0: port 2(bridge_slave_1) entered blocking state [ 1493.002316][T17871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1493.009627][T17871] bridge0: port 1(bridge_slave_0) entered blocking state [ 1493.016680][T17871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1493.189938][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 1493.201440][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 1493.327715][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1493.335369][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1493.343048][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1493.351671][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1493.360045][T18567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1493.367123][T18567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1493.374639][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1493.383182][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1493.391649][T18567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1493.398728][T18567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1493.570749][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1493.586139][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1493.594224][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1493.602371][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1493.652985][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1493.661921][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1493.719069][T17871] device veth0_vlan entered promiscuous mode [ 1493.726101][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1493.734032][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1493.765634][T17871] device veth1_macvtap entered promiscuous mode [ 1493.773309][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1493.782271][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1493.789770][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1493.798241][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1493.806710][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1493.826508][T17921] device syzkaller0 entered promiscuous mode [ 1493.848215][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1493.866478][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1493.892494][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1493.905985][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1494.104168][T17929] @0: renamed from bond_slave_1 [ 1494.278540][T18452] device macsec0 left promiscuous mode [ 1494.284114][T18452] nr0: port 1(macsec0) entered disabled state [ 1494.294132][T18452] device bridge_slave_1 left promiscuous mode [ 1494.304149][T18452] bridge0: port 2(bridge_slave_1) entered disabled state [ 1494.317953][T18452] device bridge_slave_0 left promiscuous mode [ 1494.324203][T18452] bridge0: port 1(bridge_slave_0) entered disabled state [ 1494.577035][T17953] device dummy0 entered promiscuous mode [ 1495.478240][T18006] device wg2 entered promiscuous mode [ 1495.619210][T18011] device veth1_macvtap left promiscuous mode [ 1495.636197][T18011] device macsec0 left promiscuous mode [ 1495.868775][T18020] device syzkaller0 entered promiscuous mode [ 1498.967838][ C0] ip6_tunnel: GPL xmit: Local address not yet configured! [ 1499.105894][T18219] bridge0: port 2(bridge_slave_1) entered disabled state [ 1499.113381][T18219] bridge0: port 1(bridge_slave_0) entered disabled state [ 1499.163291][T18227] device bridge_slave_1 left promiscuous mode [ 1499.170758][T18227] bridge0: port 2(bridge_slave_1) entered disabled state [ 1499.187103][T18227] device bridge_slave_0 left promiscuous mode [ 1499.201513][T18227] bridge0: port 1(bridge_slave_0) entered disabled state [ 1499.749658][T18238] bridge0: port 1(bridge_slave_0) entered blocking state [ 1499.780389][T18238] bridge0: port 1(bridge_slave_0) entered disabled state [ 1499.804854][T18238] device bridge_slave_0 entered promiscuous mode [ 1499.835178][T18238] bridge0: port 2(bridge_slave_1) entered blocking state [ 1499.854861][T18238] bridge0: port 2(bridge_slave_1) entered disabled state [ 1499.876880][T18238] device bridge_slave_1 entered promiscuous mode [ 1500.077968][T18238] bridge0: port 2(bridge_slave_1) entered blocking state [ 1500.085199][T18238] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1500.092524][T18238] bridge0: port 1(bridge_slave_0) entered blocking state [ 1500.099593][T18238] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1500.157271][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1500.175129][T18567] bridge0: port 1(bridge_slave_0) entered disabled state [ 1500.183821][T18567] bridge0: port 2(bridge_slave_1) entered disabled state [ 1500.199625][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1500.211444][T18567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1500.218544][T18567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1500.246835][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1500.257180][T18567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1500.264245][T18567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1500.376836][T18289] device syzkaller0 entered promiscuous mode [ 1500.534264][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1500.557496][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1500.571042][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1500.754061][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1500.766369][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1500.791409][T18238] device veth0_vlan entered promiscuous mode [ 1500.804490][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1500.816968][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1500.839987][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1500.858644][T18567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1500.967546][T18238] device veth1_macvtap entered promiscuous mode [ 1501.007746][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1501.036552][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1501.065269][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1501.096309][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1501.129084][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1501.158551][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1501.179326][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1501.821719][T18452] device bridge_slave_1 left promiscuous mode [ 1501.830187][T18452] bridge0: port 2(bridge_slave_1) entered disabled state [ 1501.846337][T18452] bridge0: port 1(bridge_slave_0) entered disabled state [ 1502.168556][T18348] device veth1_macvtap left promiscuous mode [ 1502.998969][T18414] device syzkaller0 entered promiscuous mode [ 1504.950867][T18523] device sit0 entered promiscuous mode [ 1505.216068][T18541] device sit0 left promiscuous mode [ 1506.342984][T18647] device syzkaller0 entered promiscuous mode [ 1506.944564][T18687] device syzkaller0 entered promiscuous mode [ 1507.633934][T18715] device syzkaller0 entered promiscuous mode [ 1509.413828][T18829] device syzkaller0 entered promiscuous mode [ 1509.443194][T18829] device syzkaller0 left promiscuous mode [ 1510.565094][T18909] device syzkaller0 entered promiscuous mode [ 1510.642706][T18891] device syzkaller0 left promiscuous mode [ 1515.079787][T19152] device syzkaller0 entered promiscuous mode [ 1516.835581][T19207] device syzkaller0 entered promiscuous mode [ 1516.956515][T19230] tap0: tun_chr_ioctl cmd 1074025677 [ 1516.964092][T19230] tap0: linktype set to 769 [ 1517.094781][T19238] device syzkaller0 entered promiscuous mode [ 1518.065026][T19285] device pim6reg1 entered promiscuous mode [ 1518.305612][T19297] tap0: tun_chr_ioctl cmd 1074025681 [ 1519.541239][T19391] device syzkaller0 entered promiscuous mode [ 1519.640080][T19389] device syzkaller0 entered promiscuous mode [ 1519.680963][T19404] device veth1_macvtap left promiscuous mode [ 1519.967512][T19419] device syzkaller0 entered promiscuous mode [ 1521.832598][T19526] device syzkaller0 entered promiscuous mode [ 1526.108806][T19745] device xfrm0 entered promiscuous mode [ 1527.444791][T19777] device veth1_macvtap left promiscuous mode [ 1527.879935][T19788] device syzkaller0 entered promiscuous mode [ 1528.914684][T19827] device syzkaller0 entered promiscuous mode [ 1528.984723][T19829] device syzkaller0 entered promiscuous mode [ 1529.359650][T19876] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1529.371038][T19876] syzkaller0: linktype set to 0 [ 1529.526937][T19893] : renamed from bond_slave_0 [ 1530.038279][T19924] bridge0: port 1(bridge_slave_0) entered blocking state [ 1530.055828][T19924] bridge0: port 1(bridge_slave_0) entered disabled state [ 1530.063286][T19924] device bridge_slave_0 entered promiscuous mode [ 1530.076211][T19924] bridge0: port 2(bridge_slave_1) entered blocking state [ 1530.083453][T19924] bridge0: port 2(bridge_slave_1) entered disabled state [ 1530.096594][T19924] device bridge_slave_1 entered promiscuous mode [ 1530.363763][T19959] device wg2 entered promiscuous mode [ 1530.424283][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1530.432049][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1530.489585][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1530.506133][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1530.519753][T18452] bridge0: port 1(bridge_slave_0) entered blocking state [ 1530.526839][T18452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1530.556221][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1530.564597][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1530.598927][T18452] bridge0: port 2(bridge_slave_1) entered blocking state [ 1530.606025][T18452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1530.671777][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1530.684308][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1530.698231][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1530.904530][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1530.982767][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1530.991388][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1531.006457][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1531.016544][T19987] device syzkaller0 entered promiscuous mode [ 1531.087027][T19924] device veth0_vlan entered promiscuous mode [ 1531.186083][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1531.196584][T19924] device veth1_macvtap entered promiscuous mode [ 1531.256766][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1531.265361][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1531.320486][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1531.328890][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1531.610717][T19999] bridge0: port 1(bridge_slave_0) entered blocking state [ 1531.626074][T19999] bridge0: port 1(bridge_slave_0) entered disabled state [ 1531.633771][T19999] device bridge_slave_0 entered promiscuous mode [ 1531.646815][T19999] bridge0: port 2(bridge_slave_1) entered blocking state [ 1531.653920][T19999] bridge0: port 2(bridge_slave_1) entered disabled state [ 1531.664454][T19999] device bridge_slave_1 entered promiscuous mode [ 1531.828894][T19999] bridge0: port 2(bridge_slave_1) entered blocking state [ 1531.835999][T19999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1531.843295][T19999] bridge0: port 1(bridge_slave_0) entered blocking state [ 1531.850464][T19999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1531.923279][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1531.936430][T18452] bridge0: port 1(bridge_slave_0) entered disabled state [ 1531.944612][T18452] bridge0: port 2(bridge_slave_1) entered disabled state [ 1531.962401][ T9] GPL: port 1(erspan0) entered disabled state [ 1531.971644][ T9] device erspan0 left promiscuous mode [ 1531.986149][ T9] GPL: port 1(erspan0) entered disabled state [ 1532.014186][T19999] device veth0_vlan entered promiscuous mode [ 1532.048332][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1532.086411][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1532.106200][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1532.117237][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1532.126102][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1532.156378][T18452] bridge0: port 1(bridge_slave_0) entered blocking state [ 1532.163544][T18452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1532.189011][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1532.206058][T18452] bridge0: port 2(bridge_slave_1) entered blocking state [ 1532.213378][T18452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1532.221838][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1532.230059][T18452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1532.254929][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1532.271238][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1532.317246][T19999] device veth1_macvtap entered promiscuous mode [ 1532.408199][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1532.420562][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1532.449957][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1532.489037][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1532.519592][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1532.557826][ T9] device veth0_vlan left promiscuous mode [ 1532.915613][T20038] nr0: tun_chr_ioctl cmd 1074025677 [ 1532.921070][T20038] nr0: linktype set to 804 [ 1533.274367][T20062] device syzkaller0 entered promiscuous mode [ 1533.430273][T20062] syzkaller0: tun_net_xmit 1280 [ 1535.034551][T20141] -1: renamed from syzkaller0 [ 1537.770442][T20283] device syzkaller0 entered promiscuous mode [ 1537.869972][T20293] -1: renamed from syzkaller0 [ 1538.796627][T20349] device syzkaller0 entered promiscuous mode [ 1539.126466][T20358] device wg2 entered promiscuous mode [ 1540.204398][T20403] device syzkaller0 entered promiscuous mode [ 1542.281431][T20511] tun0: tun_chr_ioctl cmd 1074025676 [ 1542.295854][T20511] tun0: owner set to 0 [ 1542.363687][T20517] device syzkaller0 entered promiscuous mode [ 1543.109286][T20568] device pim6reg1 entered promiscuous mode [ 1544.545724][T20620] device syzkaller0 entered promiscuous mode [ 1545.115906][T20655] device syzkaller0 entered promiscuous mode [ 1547.282909][T20719] geneve1: tun_chr_ioctl cmd 1074025672 [ 1547.295876][T20719] geneve1: ignored: set checksum enabled [ 1547.314530][T20719] geneve1: tun_chr_ioctl cmd 1074812117 [ 1549.131328][T20824] device veth1_macvtap left promiscuous mode [ 1549.157205][T20824] device veth1_macvtap entered promiscuous mode [ 1549.169583][T20824] device macsec0 entered promiscuous mode [ 1550.095769][T20885] device veth1_macvtap left promiscuous mode [ 1550.123595][T20885] device macsec0 left promiscuous mode [ 1550.380777][T20909] device syzkaller0 entered promiscuous mode [ 1550.807646][T20938] device wg2 left promiscuous mode [ 1550.897213][T20938] device wg2 entered promiscuous mode [ 1550.927310][T20935] device sit0 entered promiscuous mode [ 1553.088596][T21005] device syzkaller0 entered promiscuous mode [ 1553.184251][T21014] device syzkaller0 entered promiscuous mode [ 1553.697006][T21044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1553.706651][T21044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1553.836840][T21050] device bridge_slave_1 left promiscuous mode [ 1553.895884][T21050] bridge0: port 2(bridge_slave_1) entered disabled state [ 1553.916135][T21050] device bridge_slave_0 left promiscuous mode [ 1553.953675][T21050] bridge0: port 1(bridge_slave_0) entered disabled state [ 1554.470084][T21093] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1554.497478][T21093] device syzkaller0 entered promiscuous mode [ 1554.555012][T21096] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 1554.589523][T21095] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 1556.118870][T21182] batadv0: tun_chr_ioctl cmd 1074025684 [ 1556.132258][T21182] batadv0: tun_chr_ioctl cmd 1074025680 [ 1556.947375][T21263] : renamed from pim6reg1 [ 1559.183391][T21369] device syzkaller0 entered promiscuous mode [ 1560.138223][T21402] device syzkaller0 entered promiscuous mode [ 1560.861439][T21482] device syzkaller0 entered promiscuous mode [ 1562.150295][T21555] IPv6: pim6reg1: Disabled Multicast RS [ 1564.467042][T21641] device lo entered promiscuous mode [ 1565.618700][T21700] device syzkaller0 entered promiscuous mode [ 1566.014390][T21715] device syzkaller0 entered promiscuous mode [ 1566.418748][T21721] device syzkaller0 entered promiscuous mode [ 1566.840316][T21738] device syzkaller0 entered promiscuous mode [ 1566.988652][T21742] tap0: tun_chr_ioctl cmd 2147767506 [ 1569.845615][T21849] device veth0_vlan left promiscuous mode [ 1569.939416][T21849] device veth0_vlan entered promiscuous mode [ 1571.065244][T21895] syz.0.25211[21895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1571.714928][T21938] tap0: tun_chr_ioctl cmd 1074025677 [ 1571.735510][T21938] tap0: linktype set to 774 [ 1572.310854][T21965] bridge0: port 2(bridge_slave_1) entered disabled state [ 1572.320745][T21965] bridge0: port 1(bridge_slave_0) entered disabled state [ 1572.442503][T21965] device bridge_slave_1 left promiscuous mode [ 1572.486129][T21965] bridge0: port 2(bridge_slave_1) entered disabled state [ 1572.540589][T21965] device bridge_slave_0 left promiscuous mode [ 1572.588270][T21965] bridge0: port 1(bridge_slave_0) entered disabled state [ 1572.995344][T22005] : renamed from vlan0 [ 1575.324528][T22179] veth1_macvtap: mtu less than device minimum [ 1576.048577][T22198] device syzkaller0 entered promiscuous mode [ 1576.997653][T22268] device syzkaller0 entered promiscuous mode [ 1577.187540][T22286] device syzkaller0 entered promiscuous mode [ 1578.120573][T22349] device syzkaller0 entered promiscuous mode [ 1578.320510][T22373] bridge0: port 1(bridge_slave_0) entered disabled state [ 1578.493614][T22392] device syzkaller0 entered promiscuous mode [ 1578.763157][T22417] device syzkaller0 entered promiscuous mode [ 1579.027819][T22434] bridge0: port 3(veth1) entered blocking state [ 1579.047469][T22434] bridge0: port 3(veth1) entered disabled state [ 1579.090541][T22434] device veth1 entered promiscuous mode [ 1579.120459][T22434] bridge0: port 3(veth1) entered blocking state [ 1579.126795][T22434] bridge0: port 3(veth1) entered forwarding state [ 1580.132571][T22463] device syzkaller0 entered promiscuous mode [ 1581.589457][T22515] device veth0_vlan left promiscuous mode [ 1581.639369][T22515] device veth0_vlan entered promiscuous mode [ 1581.749662][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1581.773460][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1581.806123][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1582.016276][T22548] IPv6: : Disabled Multicast RS [ 1582.033056][T22550] device syzkaller0 entered promiscuous mode [ 1582.059668][T22550] : port 1(vlan1) entered blocking state [ 1582.065658][T22550] : port 1(vlan1) entered disabled state [ 1582.086232][T22550] device vlan1 entered promiscuous mode [ 1582.599721][ T24] audit: type=1400 audit(1770881892.480:182): avc: denied { create } for pid=22566 comm="syz.6.25411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1583.054595][T22596] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 1583.961204][T22654] device syzkaller0 entered promiscuous mode [ 1584.078475][T22665] device sit0 left promiscuous mode [ 1584.135153][T22659] device syzkaller0 entered promiscuous mode [ 1585.400715][T22707] device syzkaller0 entered promiscuous mode [ 1588.450575][T22961] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 1588.588199][T22967] bridge0: port 3(veth1) entered disabled state [ 1588.624354][ T24] audit: type=1400 audit(1770881898.500:183): avc: denied { read } for pid=22968 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 186) OK Stopping crond: stopped /usr/sbin/crond (pid 179) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 133) [ 1589.131118][ T24] audit: type=1400 audit(1770881899.010:184): avc: denied { search } for pid=23009 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: OK Stopping iptables: [ 1589.587622][ T24] audit: type=1400 audit(1770881899.460:185): avc: denied { write } for pid=134 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=411 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1589.614391][ T24] audit: type=1400 audit(1770881899.460:186): avc: denied { remove_name } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK Stopping system message bus: [ 1589.677209][ T24] audit: type=1400 audit(1770881899.460:187): avc: denied { unlink } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 1589.780337][ T24] audit: type=1400 audit(1770881899.500:188): avc: denied { unlink } for pid=134 comm="dhcpcd" name="pid" dev="tmpfs" ino=412 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 done [ 1589.885979][ T24] audit: type=1400 audit(1770881899.520:189): avc: denied { search } for pid=23041 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1589.970878][ T24] audit: type=1400 audit(1770881899.520:190): avc: denied { write } for pid=23041 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1590.065810][ T24] audit: type=1400 audit(1770881899.520:191): avc: denied { add_name } for pid=23041 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1590.161371][ T24] audit: type=1400 audit(1770881899.520:192): avc: denied { create } for pid=23041 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 killall: can't kill pid 300: No such process killall: can't kill pid 1888: No such process Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 77) OK umount: can't remount debugfs read-only Connection to 10.128.1.146 closed by remote host. umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system isSent SIGTERM to all processes Sent SIGKILL to all processes Requesting system poweroff [ 1593.728862][T18567] device bridge_slave_1 left promiscuous mode [ 1593.734999][T18567] bridge0: port 2(bridge_slave_1) entered disabled state [ 1593.742504][T18567] device bridge_slave_0 left promiscuous mode [ 1593.748663][T18567] bridge0: port 1(bridge_slave_0) entered disabled state [ 1593.757162][T18567] device veth0_vlan left promiscuous mode [ 1593.762963][T18567] device veth1_macvtap left promiscuous mode [ 1593.769182][T18567] device veth1_macvtap left promiscuous mode [ 1593.775246][T18567] device veth0_vlan left promiscuous mode [ 1593.966633][T23207] kvm: exiting hardware virtualization [ 1593.974635][T23207] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1593.981903][T23207] ACPI: Preparing to enter system sleep state S5 [ 1593.989006][T23207] reboot: Power down serialport: VM disconnected.