last executing test programs: 39.719936287s ago: executing program 2 (id=720): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000500000071103d00000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x24}, 0x94) 39.47849612s ago: executing program 2 (id=724): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0x15, &(0x7f0000001480)=ANY=[@ANYBLOB="18000000feffffff000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000c00be678850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r4}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x2482ac861b82b520}, 0x20) 39.302419221s ago: executing program 2 (id=727): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000004440)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000007000000020000000300000000010000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000f40000000000000000020000000000000002822be27f95fa813b72ae2f5f53571fced77ed0795c5179ccd9bd750a4d90fd6ad7d1fef5baba372adef5880d39a9dc301ded29c300"/87], 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0), 0xc) setsockopt$sock_attach_bpf(r5, 0x1, 0x42, &(0x7f00000007c0), 0x47) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="01001bdb00000000020000000900000000000000", @ANYRES32=r4, @ANYBLOB="000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r6, 0xd}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r7}, &(0x7f0000000880), &(0x7f00000008c0)=r4}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180900000000b044fe5ee2aed8c59c9db9eed012770000fdff060000e49a000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000040000000060000000800000000000000c80ed099e25fe86e07df6479f04b8aeb11"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61156c00000000006113500000000000bfa000000000000016000f00080000002d0301"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="b702000006000000bfa300000000000007030000407effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7ebfcd0cd00006ed3d09a6175037958e271b60dedf8937f02008b6d83923dd29c034055d47dafe6c8dc3d5d78c07f34e4d5b3185b310efd4989147a00000000f110026e6d2ef831ab7ea0c34f17e3adeef3bb622003b538dfd8e012e71f6420b90adddff61b5b0a341a2d7cbdb90000bdb2ca76050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132658555cf476619f28d9961b626c57c2691208171656d60a17e3c1c4b751ca532e6ea09c346df3d7cb4ebd31a08b32808b80200000000000000334d83239d1d2e9ff10ff2d27080e71113610e10c358e8327e7050b6c860dac12233f9a1fb9c2aec61ce63a38d316ef49b66d6e42fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a5f3d74ca891c4594e8a4399e01eadd3964663e88535c133f7130856f75643619f567d2e24f29e5dad9326edb697a6ea0182babc18cefd07e002cab5ebfcaad34732181feb215139f15eadddcb0c7cbe31fbae7c34d5ac5e7e64c21add9191eadd6e1795ad6a0f7f8cd3fccbdc3dec04b25dfc17975238345d4f71af35910b158e56657b7218baaa7cbf781c0a99bd50499ccff0f000000000000c7beba3da8223fe5308e4e2833baace04f4087c4f0da0d9a88f9dbb593ddeb3f0932a4d0175b889b8eccf707882042e716df9b57b290c661d4e85031086e97bcc5ca0e221a0e34323c129102b7b7a643e82e88a1940b3c02ed9c92d6f64b1282dc519b00159830d7617001154c46bd3ca96318c570f0721fc7aa2a580900000000000000b4f22cdf550ef091a78098534f0d973058594119d06d5ea9a8d085734000000000000000c12346e47ad97f4ead7cf754a52e4b2d0f22d428bd705414888700a30e2366c6a06b3367a389ca39059787790017b0689a1f3db9c24db65c1e00015c1d573dab18fd0600885f1ea8f2fd299fc3cdafda323e9c7080397bc49d70c060d57bc88fbe09baa058b040360ab9261503d2f363fb099408885afc2bf9a4f8c3506b669e889f5e4be1b8e0d634ebc1057b7e98186fc5141bd670dba6f43279f73db9dec75070cd9ab0fd969169ef6d2857b6bf955012cf7fe50d133da86e0477e42b98a6cc999dc21c3ef408e633dfa35f14d6e734837d365e63845f3c1092f8e34fc7eac9e8af3904ea0f3698cd9492794b82649b50d726bff873339c4cad4ead1348474250eda2c8067ab730c1d85969b95a2a5687f2ed690000522a0b7426000000000000000000000000000000000000000093fc7a82b98f99d9dedf7ba17f5f0b6d15e552fbd21f7eecff10243a43af03eea84c4304a5d3f93c02000000000000000043e1ed82b9aa0ae92a499984a009000000937523f5292d12659906005cde64f903c3415c458a2b32c2318f0858f19c6def80e1481e8e1c0098fc3f38b7a57211adb15d824cfdcf229628c0de49860a44286fe0e257cfa4ce50f3d10763d442824414a73c06837fe08de62f8710ca977960b74d0000ce73da6022a8671d1a3575b4e18c28c73203bf134686dd65808452cb6b76fcb134252c78de9b240de7b4cd015a77f76bb6470c05fc980b3d8f3f964f432a4bf6cddd6222c2da006b6fdb9c8468ae1d986a893b9519444d16a6dfa92c04331a6698507048fab5ae402acd05fe621f22712dfd09004770b4278fa14547d8ce3c21188e5e4e2baacd98e8e451d6aaaf090000006ed1d9018000008dd952595d78e9583bf4ea5de36099e3cddcb24ebb6eddb9e87c9ece87a42c0000abdfc6ea55887dfa18d0aea1b6eca5a883702b0bf3aeebb225895db90e237157a34e9f447237ea5b391bddd1290f7ce987a0e36b8e71b1779bbe95ffa9c3e0f6ba66e4d48e75253e3d633811e4b3220616aafbe7a3a18375ae593eb58fd500426286472466823cb8e1800aaaa0d9463c0c4ea5541a55df6eeffec0b66482228816cdfccb98374c644eea45de7867a0efbad0ab2bc33b350440a90b791b2b33f74a112a3b91b40bed8db2df8633207f8387e04ca52ab0f3f7b058b13523b896800b992972d9609551c27a5916ea16069c5bf55b98d926d3c27e7945b2999600000000f857bc1332d200194f658b930780603134ae6b7f5092772bd5d880dbe21b790c475b14b7fe4fe002dffd651faa79bb0cee0cdac23c3218f2ddaa6f7ba04b696a30d313bed30ba8f35569a9b07ee7308da09c01a4b827aa17bc2213fc1572b0204dd456b11a454d1f3f14179974aae624ea59500f5e048b2780666de81a040663c57f49af25be909984aea1b81f33426f86b4b941c08dfe2bc8ec246ec1aae120c42405e428923f3a83d9ba5c373f5e8a54120b451e2806370f1ed60c9fd5d9af4d16cb0f413c324da52d4bd2e01d3ac2d578d72e2d63322dfc9245ce3e3a097fb82f4e3b61a57094616020f72f1c55ee3d325c7496a7c2f10cfea516ae436751227378f00ca0f1f6c1dcf879700dd90b96a330f92bff736c83ca53e7f02b734d1a9292896f5d7f244bfab4946c7042e88206f641eafcc5b4ba7a7880533cdeac995d1caf6936f356ecf07a0084e7adc2dc12417997b03087c7b3b44b06f6158a2a18ce0e56ffbeb22f40521dd9972583d413098aa80db98ef324a2bfb7961c07b47521973cf0bb6f5530f6216b447b35d6e06b72b22b29de42bb1bc8ce0a0e3500000000000000000000000000b92eb197e4149627920000008000000000801792756f90b37f0858efc387f559203f314a4b0ed750fa72e5948ac3fe5921c14ef578d413e7b2a9e2f87f7b44949fe14c00000000000047030c09f62d444b4981db81799776eeb444000000009705fa8b56779bc876ad4f8d8c8e50815c4c3b27487996c09121caf47f76158362c74904f89cbc588aae84567a83571ff72bb65c082b5a8dee145ff221159aed2768edc05a3167d84205d5af86553c21e1f023a51c0e179fccfbc201982e3ddcaa45613899d19082453b180ca0c525b8d3cfaf7d0bcddeb5d5c7166038f276a92941393ba5e51f77172822bd903d9f8b436656771774ed88daab0d0cfdd1bf4d30ab566e1a4cb3ad66d830e10f7c1de13218aea21e7def613204c2b7c1ad48b01c208f4032e93408000000000000e96db049b92fc32ee34fe7a3419c8fbf03d61c159dc5864e030000a2c55b614d622b8de966c97e1940026f96db3c78ca18c9f08d1c47edf1a4d7298109f31b6078711ee72eacab84213bf50000000000000000000000000000001217887d0452aa6d26e4614d511710abeec84b78c027c160ba375dfa55a49b832ce4dfb91122193d514ed992c07f8cd6d897b314907e15642da228dbc03429e6e0e7ac118ed351c3b0c44bf5d8b58be573f8333aa8cc2ec5b5e305b3dee2562d415b4b9ed530797f55f9fe8510423409629a09000000000000009a35d9ca93e4b4591679547b8de8af1782451f7b8e1de508f1e9e525210d62bc850f8035040ad9e562be58797515b737bfb21d35ac560f99dbd18dad5e6345a464955e8141d75b6177e4fa176a020b0000000000006e76f0294fee7d19a0f327f8796d77b6e24b8df4bb438b527d10e657d49b844198ea9f93c4fd6fd2daa9bd87fd1e02ecc8075dca1280c201043257e9bd3c9a7aa150eb1711632b76d4dc0555d4bfcfd057980136d6e9000003b24fa300ef90bfe4ad364256937796f941c2faad94785f48777941f0cd3dba54ab6a5d5e91e90ac9ae994c3d4108b2fe7eca9413ac9bc138c74800487eb19c48db3f79be964808f109b5e36fc7fdd41def361427b6b9c118e5c9a0a1d5ca24886e33a7f81b2188ec75a5fc9302e3695bdcc9ab11201ef940569c995c21eeaefe2e8fc02e0433dc7371d1f72124ba263e554c30fdd7cd8c2da1e8706417da9ad8916551a1182fac08603dfc2f2279ba161c13984cd753b54a85e6f3010975e9ff51318b09fa13e2d38ce013aab41524c298c3719e31bcb1f102eaeee69a19e006bcdb1acc2664efa949a1a07bb3d7848d5e1381fbe63c522053a3bb32eb6345e10f7a12bf84e0e196a00833f464dd2f6547f14ebf137fce33efeb813211f31ff24d7dbb00f2574ccda59b3ea068fc2a18c37ee579f5a9ecc47da73684bcadd209ae5bbb7147df74d027d8d0adcdb54182c9de8053fc8b1b9d19c16c53d34db6e26f6a88d449f6abf3010100007e206a758a3f02816b4e097cfa3d46e45e7949c5b10691d49b9693a798a330a1ccb32d49772e80862df36dc0156b3f72cd85083f8e96ca1697457ec722766bd46ee2424975a38149bd57e5c0eb4087fc243e7e51b0aca9f0ab0668d7f2ee9ad9f267d8804417aa7e36a64d489bb84a1483fd3c3ecb024060002858cbb1f7708f5b41fca2fee7c03b1f862ce88dc313d913e041dd7583a1ac41c466757c5dd07ea2c5d62a000000000000000019a4e9a9c2cbc906f97fd6eb71b18d09a5df123ebbdb2827b43aed6a29e9942e402c1ae52e9cb98f3019d364fc21ea12023db91ced3c2f06550cef8a79ed39091e4776001187d0ab2f82478431d36470cc008d745ce8fd64c9aa64da230bb080945a557081b767beb75b1ea856a55c71b8fda672289aa6088630d48ac8039f19fec3acbcc5944a4e6fd44af8f10110db730a8d0d41b4ea36f9510f843a471963bd4621b9e43f08d341bb69df430ac6398c1b28bdd33b69b4b86d7c5f30cf728294e8ea1861ce50c367498945285f73c94d91210652eb4f3077cab6be2a3512eddbcb63d091d69fb1b26c8ada9a9f9355aea34fe55fd0d3011cb83ac03268dc66dd108a4e9944241e1d4ba69212ee0e7526e72c19346d08d3c3c82cb987f1bd2fd9ce2c88082ea23abbf23c6bd43fc9f9f8ea7656e25d3d73cd056b1f782de1fe349fc33546558366ed99940c0fda039272d277a3576d4e0469779d711e10b6bf040f7274fd9577c1c33326d2e60ee611ae226ef00e2944fb727832dc8dad36a6072aacfc4bcefb808ab7b3b95e0f60616320b2a9e1f8fac812daac9983639b35184803b7d192ce1f226e97fa23c37df95d067a54a8b412644cad9ecc251fbe418a81aaf00cc8d15758ff0eb885a40630396ba76b8fadc09e62ef70c8a0121e7e8322cb8bc0f50ad33a17143a29c14ecadd1b6244e31b888d8f3fa03208d3e9a4826a98f31995509015ebdc89f2f3106e54d5898d3758b9bfc9e4924e9cedf7f8fd584e7185703cc5f23741ffb480b5a87cd7efcceb409d354bdab211ebd50ab12b13c1b8ce93093a59a0f952153c2efd10e72ec9ee5fa2a00f9637851ddb81d059f9a363c4ada68dd25f19ee9e4841acee7c1b35ad6f9d54cf4939ce78a55a04e655d7746a3989c6f33b02f8497aacb6bfca7456111900000000000000000048d35af24acb66fdd4d1fb150138f0ee6abfc7049c94346868ed76d3a5df7335184386a5c532d425f1a098ff93efd05e5dd8b765121fbdfe5ef44f6472b939c31883f45889142e82086c2448da60d7a40774d71c2da2e7f6d4fe5d36923213cc7b7d71a1c90006e8f8d84953f284b0eb4366beff5df5595827dcd736e8cfab28cfa416e83c06213ca7fd21af56e3de1d80e77060447e20a8b317a4c06e24e99239824d08abf670a685bc46c8168bee4cfc30cc6d0dc030a592925bad3e0f805f0d4b2b600dc3f0c4c6f75bb4e49982f4198ac90ab77c5572c956d415858bad5ee117b3e5f1507bbd0d7a30388865deb11106a93225a81feb08f5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r8, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f008004de7f9c7643600000088ff", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 38.385128832s ago: executing program 2 (id=744): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0xf, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x79, 0x0, 0x0, 0x48}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x28, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x80) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0309"], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={r4}, 0x4) 38.368418002s ago: executing program 0 (id=745): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x88702, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r3 = openat$cgroup_int(r0, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) write$cgroup_int(r3, 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x4, 0x4, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xb, 0x800, 0x829, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x80, 0xd3, 0x4, 0x3, 0x1, 0x0, 0x9, 0x2, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x601, 0x0, @perf_bp={&(0x7f0000000440), 0x3}, 0x100415, 0xc6f, 0x1, 0x4, 0x3, 0xaa07, 0x402b, 0x0, 0x4, 0x0, 0x9}) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)={[{0x2b, 'io'}, {0x2b, 'rlimit'}, {0x2d, 'rlimit'}, {0x2d, 'rlimit'}, {0x2b, 'memory'}]}, 0x24) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000027c0)={r6, 0xe0, &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002500)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000002540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002580)=[0x0, 0x0], 0x0, 0x37, &(0x7f00000025c0)=[{}], 0x8, 0x0, 0x0, &(0x7f0000002640), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000002680)}}, 0x10) sendmsg$inet(r5, &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r7, @ANYBLOB="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"], 0xb0}, 0x4090) 38.130436735s ago: executing program 0 (id=751): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x8, 0x7f, 0xfc, 0x1, 0x0, 0x3, 0x0, 0xe677246e5aeb95bb, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x33, 0x4, @perf_config_ext={0x2, 0x1000}, 0x200, 0xb, 0x1, 0x8, 0x68edde25, 0x2, 0x9, 0x0, 0x6, 0x0, 0xbd}, 0xffffffffffffffff, 0xf, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@map=0xffffffffffffffff, 0x2, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x101c01, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000fd00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x62}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000f8ffffff850000002d00000018110000", @ANYRES32=r7, @ANYRES16=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r8}, 0xc) socketpair(0x1, 0x1, 0x1, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000004000000000000000000000300000000030000000200000000000000000000000000000105f4cc7480000000020000000000000c0400000000002e"], 0x0, 0x50}, 0x28) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') write$cgroup_devices(r10, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) close(r2) sendmsg$tipc(r3, &(0x7f0000000580)={&(0x7f0000000380)=@name={0x1e, 0x2, 0x1, {{0x42, 0x2}}}, 0x10, 0x0}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff0000000000000000851000000200000085000000070000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r11) 38.047977496s ago: executing program 1 (id=752): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%pS \x00'}, 0x20) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000780)={0x4, &(0x7f00000001c0)=[{0x45, 0x0, 0x2, 0x8}, {0x2d}, {0x2}, {0x6}]}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1, 0x4, 0xa, 0xc}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r5, r4}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r1, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x3, [@volatile={0x2, 0x0, 0x0, 0x9, 0x5}, @enum={0xc, 0xa, 0x0, 0x6, 0x4, [{0x10, 0x80000000}, {0x9}, {0xa, 0x9}, {0xd, 0x7}, {0xd, 0x9f}, {0x10, 0xe5e3}, {0x1, 0x10001}, {0xe, 0x401}, {0xd, 0x5}, {0xe, 0x6}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x6}}, @fwd={0xc}, @type_tag={0x7, 0x0, 0x0, 0x12, 0x3}, @func={0x2, 0x0, 0x0, 0xc, 0x4}, @float={0x2, 0x0, 0x0, 0x10, 0x8}, @const={0xd, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x61]}}, &(0x7f0000000600)=""/156, 0xd7, 0x9c, 0x1, 0x6}, 0x28) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={r8, 0x20, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x4, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x6, 0x1, 0x0, r4}], &(0x7f0000000300)='syzkaller\x00', 0xe505, 0xf2, &(0x7f0000000340)=""/242, 0x41000, 0x20, '\x00', r6, @flow_dissector=0x11, r7, 0x8, &(0x7f0000000700)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0xf, 0x3ff, 0xa}, 0x10, r9, 0xffffffffffffffff, 0x2, &(0x7f00000007c0)=[r2], &(0x7f0000000800)=[{0x2, 0x3, 0xe, 0x1}, {0x1, 0x1, 0xc, 0xb}], 0x10, 0xfff}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10000) 36.931321028s ago: executing program 0 (id=755): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_serviced\x00', 0x0, 0x0) r2 = syz_clone(0x81200, &(0x7f0000000140)="ebda450d920626939759208642195a29b56805ab313f02a4708a1ad0d10b02001383f1f8d993644478db8fee62c5510916d1553e6b9f06e552b48af8dfd478ca0ec42e33a2fe87db9ba688a5f56ec62132cc0264156090a76fdad3c954e85583cc50d134e3ba440dd3d9ae410d4107dda4a8a4478e0352294fe9ce6d109f2dba7b01f89ed3ecffef3a1d386739ce0903c33c2109aad7f8aea22404445295ab952b9660f066090537ecf301eb1508c8219d655abc936391de77bbee1797b448dd344217e047245fe0df7312bfed", 0xcd, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="199ae943a380efe28750d4") r3 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf3, 0x0, 0x0, 0xe20c9, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x10000, 0x1de, 0x1, 0x9, 0xb343, 0x29c7, 0xdc9e, 0x0, 0xfff, 0x0, 0x4}, r2, 0x3, r1, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=r0, 0x1e, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000340)=[0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000440)={@fallback=r1, r1, 0x39, 0x0, r1, @void, @value=r0, @void, @void, r4}, 0x20) sendmsg$unix(r1, &(0x7f0000000980)={&(0x7f0000000480)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000500)="92f5fcc869dc5e6104cd02a14b0fddb8b93323686769c00baaf76eecc4b62b90ebfca723846f44836e17355fd36c035444ec0fe7c91bebf089dc1c1fa6d73db68c0f51fe6c748e6ac265c5d2554f1337514b7579ab3a95fcf98537edaafdd324ead3c2995dc3c37e42b30d38b749b20385fdb55038dab79df0905a168a10210e59c4d97a01c364c7cfbbf60b152e628dec20a90a7861b413e06bcad9f0f02f5263e9ffcbd2597a1580bc95c5bf095214db6b09cfdd18f611b951f437fa94aea0c5fdf1946bacb3470f28d2b67bc160f0241fefd12d2fd3960d567905b92fcac6585b9e3ea9f8f369e136", 0xea}, {&(0x7f0000000600)="e10fcb258b3561ae1cd5aa5a7fb6e6670600e339ead4ae9b68d78595ab882bc59747c8ed366587e339ae696304e0869344e9711dfdabfff855cb865db40d40410222cb97d04e5bad7d4e18fc3925fa8d070f02db1f88b56f6e1159b6ab0ee9210a", 0x61}, {&(0x7f0000000680)="337e2cd236c876bf453116a48932cd7b5f1f4f27ec48d704d62adf92f28cd7761323ab68cbd362abfd2f0f30551c9e037537d2889f1385a7f453973893bbf9060867fe7e4515", 0x46}, {&(0x7f0000000700)="e78d6c05956c93240d9c0c6376bddb01092f34ac8492e34260babaeaf02e5e5ef0d8dd9f517774bb4a7de19c06261cd2ecdd7b9d159d824d4ec658f0feeac6518aac4a1a8b19d91bef306895775436f490ca32e0ad53693c7767acc70be36fd9af1da7eb", 0x64}, {&(0x7f0000000780)="9356e486ce21db292f462e713f7a70c4f7364bee76afb99721bca05bc2bb47c8b036dfc3fb967abbc8dd30dc66", 0x2d}, {&(0x7f00000007c0)="af39226604c5c9fd2d799799af2ba75b1697789c9e3800e4085b1e676a1a663f309a694adcaa922d796afafeaaf57f9343fce7093197cd44c2e67d268242ec009fc786b8e8f8f3ce73c2ee95bd8277d31e36a71aac4e4179e15c037c34a9618a125c00ee738f9d61c413fa6e754a48085807d4720db0d75f39373cdc7f3de6b7089db8d7a2606f4213efb42d07d16e66a6dcbe7e7e6833e26c97a7218fa2d774290c8258993af6b677e976ee9dab6f625cc84f89bdb8cda5bd5c9fdaada8773a822667921da958c000ce80ba6133103d68084ac027dd8c9f049f6e27fa003c3b376234fd7ce0", 0xe6}], 0x6, &(0x7f0000000940)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee00}}}], 0x20, 0x28004010}, 0x4) r5 = openat$cgroup_procs(r1, &(0x7f00000009c0)='cgroup.threads\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r6, &(0x7f0000000a40)='devices.allow\x00', 0x2, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x335) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ac0)=@o_path={&(0x7f0000000a80)='./file0\x00', r1, 0x4000, r6}, 0x18) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000b00), 0x143100, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000b40)={'lo\x00', @broadcast}) openat$cgroup_procs(r6, &(0x7f0000000b80)='tasks\x00', 0x2, 0x0) socketpair(0x28, 0x805, 0x9f, &(0x7f0000000bc0)) openat$cgroup_devices(r0, &(0x7f0000000c00)='devices.allow\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000c40)={'veth1_to_batadv\x00', @broadcast}) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000cc0)={r2, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000c80)='tasks\x00'}, 0x30) openat$cgroup_freezer_state(r1, &(0x7f0000000d00), 0x2, 0x0) r8 = openat$cgroup(r6, &(0x7f0000000d40)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000d80), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000f40)={&(0x7f0000000dc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0x63, 0xa, [@const={0x3, 0x0, 0x0, 0xa, 0x3}, @datasec={0xb, 0x5, 0x0, 0xf, 0x3, [{0x2, 0x1, 0x3}, {0x2, 0x9, 0xe16}, {0x3, 0xae2e, 0x9}, {0x4, 0xfffffffe, 0xd5d}, {0x4, 0x2, 0x6}], "acdefb"}, @ptr={0x7, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x0, 0x30, 0x0, 0x5f, 0x2e, 0x30, 0x5f]}}, &(0x7f0000000e80)=""/169, 0x86, 0xa9, 0x1, 0x69ec, 0x10000}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000000f80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa8, 0xa8, 0x5, [@union={0x7, 0x2, 0x0, 0x5, 0x0, 0xd802, [{0x5, 0x5, 0x7fff}, {0xc, 0x5, 0x25}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x1}, @volatile={0xf, 0x0, 0x0, 0x9, 0x4}, @enum={0xa, 0x9, 0x0, 0x6, 0x4, [{0x3, 0x4}, {0x8, 0x9}, {0x1, 0x80000000}, {0x9, 0x7f}, {0x0, 0x4e}, {0x5, 0xc}, {0x7, 0x952}, {0x9, 0x3}, {0x7, 0xf1}]}, @const={0x6, 0x0, 0x0, 0xa, 0x4}, @volatile={0x10}]}, {0x0, [0x5f, 0x61, 0x61]}}, &(0x7f0000001080)=""/166, 0xc5, 0xa6, 0x1, 0x2}, 0x28) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001240)={r1, &(0x7f0000001180)="163bbfe7199da1a55977f6be8b36b161ea3701592d568a84e2283976f96a0ff955c271d621b9e55d17c49e6ebf9c2a5b993b0d3b938b8e771ef03f938b0de3653c446c0446bcb94dfaee51297a5b86a49230294cdc024b6f1034f3638b92c0c2c7a3b7fa4b97b2129d11c7fbc434c4c571d6531aeaa638e6d53eb3af10a29a8184b6c5c8e862fdd01103bacb0765d64a808c747d"}, 0x20) r9 = perf_event_open(&(0x7f0000001340)={0x3, 0x80, 0x7f, 0xf7, 0x2, 0x1, 0x0, 0x60b3, 0x8100c, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000001300), 0x2}, 0x0, 0x0, 0x4, 0x5, 0x9, 0x6, 0x4, 0x0, 0x23, 0x0, 0x7fffffffffffffff}, r2, 0xf, r3, 0x3) perf_event_open$cgroup(&(0x7f0000001280)={0x5, 0x80, 0x9, 0x6, 0x9, 0x2, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x5, @perf_config_ext={0x8, 0x5}, 0x0, 0x8000000000000000, 0xfffffff1, 0x5, 0xd8d1, 0x7, 0xff, 0x0, 0x8, 0x0, 0x8}, r6, 0x3, r9, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001500)={r5, &(0x7f00000013c0)="ce4cd8edd70b284c3962e6faaff40986631296bf6b848f712b1eae75a2faa6e98f0148b8828c06cf7905b1b9c38ee014b7ae9ef687212d4d7b086b59e9edcdb499082020d0f1235b7a019d34b01b63ce68fd8c74cacd3ffe0b2826677ac7226be3e2fca4f7348c557b937b0fa8206f5aa9f278a9933d1548a63d1bea6ee58fd1db14115b923b4dce6ddd2795acf4", &(0x7f0000001480)=""/65, 0x4}, 0x20) 36.883767138s ago: executing program 1 (id=756): socketpair(0x1, 0x1, 0x530, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x23, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb79"], 0xfdef) r1 = perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1000000002000000070000000400000000090000", @ANYRES32=0x1, @ANYBLOB="0b00000000000000000000000000000000000014e45b57e5b2254a1bef028a47b9076a11885ed4c096033fed2792f625577584b50d9f9c0f4d1730ff8048efcb122867c4714b53b744fae330573907a076a34ed1d849ccad74225f18060000000000007848cd3a92607d0ef3b22c2c7a3c2827ed7ad9ddfcbde309f7ffffff96fb247c9eb81928f59e789ee9cd8441b55b5d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000040000000400"/28], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1e00000000050000020000000100000000420000", @ANYRES32=r2, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="0300000002000000030000000100"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe1d}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) mkdir(&(0x7f0000000140)='./file0\x00', 0xac) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000180)=r4, 0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x3, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', @random="0400"}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18800000000000000000000000000000730184dde136000000000095000000007135335c7de62709e0c8af4f2b9f70466bd559a0422cf87e70c5c7381e9cfd79006df9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0002000000000000e400000000000000000000000027892e32d9c5473a1f2993004dcd2ef20c9fa480576fcb5bd4000000000000"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r7, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 36.77444471s ago: executing program 0 (id=757): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700000004000000000900000100000028"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x1, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="1e0328004d8c71ef2885634a8270001406"], 0xffdd) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000004000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r4, 0x0, 0x0}, 0x10) 36.77206729s ago: executing program 3 (id=758): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000500000000000000000000850000002a00000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) close(r3) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="0000000000000000cf08000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0xc) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, &(0x7f00000011c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0xffa4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb5}, 0x48) socketpair(0x1e, 0xa, 0xfffffff9, &(0x7f0000000080)) (async) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6e5a, 0x4}}, 0x0, 0xffffffffffffffff, r0, 0x8) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40440, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0xffffffffffffffff, 0xfffffdffffffffff, r0, 0x0) 36.578961302s ago: executing program 3 (id=759): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=r0, @ANYRES8=r0], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES64=r3, @ANYBLOB="00000100"/20, @ANYRESOCT=r2, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000010000000000000000000"], 0x50) close(r4) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=r1, @ANYRES8=r1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000005ad233a5000000498a3d0c8100000e0cd8f47f111f19610941559493b8d2d3b7a9d7240223232dc71d4fa119da9d029f83072370c4afe63029e412679772e59d8b3c540d5f88cf148b1c58f6e71bfa21ca2634d2b6102957710bf1d4db45d07f2390872525415fb86d42cb14197fb48407887181a227a267552f0ca1f6f4426aaf5a991880a4d6df8352a41d779fea5b716d7274df30ebd9dc14b8fd407fb9263b31b4acb57e40f52b7f3cb0ea562f55a2b38a72cec6b2d98c1fc0f53e"], 0x50) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x14, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000300000000000000f7ffffff18110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa2f8ffffff000007020000f8ffffffad4f6ca7a66308e09d91f94cb703000008000000b70400000000000085000001030000001801000020786c250000000000202000000007010200f8ffffffb700030000000000000085000000060000009500000000000000aecda1f021501caf94ae9c7d182e3b9593be38a5479251c716434efd6162725bd92d25450000000000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r5, r4}, 0xc) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061180c000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='\x00'/25], 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000016000000850000007600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fcffffff850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (rerun: 32) syz_clone(0x60000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r8 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfe103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x8}, 0x2000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r10, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 36.550705482s ago: executing program 3 (id=760): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1, 0x3, 0x10000}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1e030a004d8c71efa68563"], 0xffdd) (async) write$cgroup_devices(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1e030a004d8c71efa68563"], 0xffdd) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x28264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_config_ext={0x1eb, 0x10001}, 0x2018, 0x0, 0x0, 0x2, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0xe861, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x61]}}, &(0x7f0000000180)=""/133, 0x27, 0x85, 0x0, 0x6}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000280)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000280)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0xc18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) 35.778491631s ago: executing program 0 (id=761): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ec0)=ANY=[@ANYBLOB="b702000024000080bfa30000000000000703000000feffff7a0af0fff8bffffd79a4f0ff00000000b7060000ffffffff2d640500000000006502040001001f000404000001007d60b7030000000000006a0a00fefdff00008500000026000000b7000000000000009500000000000000c743a0c8e3ebbadcb74220e5a7efcc9ac1467fb2ea80dbcf8df265e1b40e4c8afd5c0c000000008da68076774bbcdb2c769937000090af27db5b56024db96bcbbbd2cb2000ce03000000000000007e357754508535766c80114604a86fe569b05614eab9297eb290a248a120c9c6e39f403ff065fd3052aae80675eeba68562eaeaea5fecf298ca20f274233106eab63ecf772de7b265040b6c50b7420b48a93fe94c756108afcd0b2eb78040000005f02a5a6474ae549070004000000ed5020e6474ac921fee1f6d8ad6a80d0947cd6d4a561ced21a0b4a902be6af7ec2d1ba002e57f301000000000000000000000000100000aaf25343063e6581f9e6de14ad72e5ad84309f47f96a576cd20cef7ed951a73ea73d7c7f14e306f1f1d1377e57abb19700f0077e9d0000b93eb0f2c6f8141e350dc68147e5958128d22d58625cf9dba211bfff9c3709c9b134625d3d2369f516a49eeeb1a662c8dfb875bdf5c6ba73cccdfacb202994c40d322717faff03323dce8a34ee0ca2cf61efb4b30000642735d6d482ba98d252f36c54333a8b1aa736369392b9067665339820f5f1557b0bf7cc06a5a13c714e0b1a1f000000ff3283076cda3d0b1a2905cfc3d04f1db264b530abcbe44bc405f600807909727fb819afa1907228fa9e83433eedb4ac88d0285594ffb0d14c09d5c77f33702822b02488ea570204c8441ced81cacf945dcb2486d658eec8bcaffbe800a041a378b40dc9e3600e916ae6307bd8325a442095bc9a8b0c95905979f34adddbb26f0d24425c8ab9d937d84b521914f92eed3d3e9de82942a952e86b567aff5bc2e3d1fcc00f618363df5d0d181ee8f4b8fd356c9eb365adc037e443820c05c5db16ff07a9cb471e2ebf91ab00a05f88c1cd55f8c81f5eb1f8d615ca27efb2193bb61665a1ce37f30c2efc9c3b5a4a5d95479fac471ba60fbd0e50225563cd37343d09da72472efc2b2877fbab12a891513e5f0763ae06c0610a2869747c143d7500760600f3ffb2310e19ac58bf29d7f178d09a9f634a3ae492f54649589e3692768a0f3a082c5242c8fa7ff40007ff275df45508ad85950d8e08465fa1067ea8f383b3e7a7ddf5977d46f4bc38f914b4a496426d8468f9ba618b6b2218b50c8fc9efbce3ba799cf70de7e13be871aa7eb402e2b11f440361e18d4e334bfc6ae54e62e67a0338c756c544189e4519a029674e2a2bbbc7f6600000000000800000e5e30b70b198246d3a62660600000030a0af132e680510811d3ab71af5d98e2d3d928a749e8b9402d14655612bd58fb40b4625cb69bf6cea97b447f2d970d99100000000086000001b881afb2cc500003a73562af4878f75b4c98274eeb666aa1f5fcf91990cf0dcfef9540057b8a3fff2bc02c5941626d2015f414546e87835ba18e9101734a9e9c6955fc6b9a25fe2a3dd8bab7f21beccba5493a164c663eceed401737c12c65804712236a9a29a43b1e27e9b6816f2328ea8423121f12b7b35aa721fef26934ccafde573bee5c33ef15309f43cbd5d61aa679a9c402d337ebf57a5eacb569401c1df7b9c45b09743c61d1db37f0000000000020000000061d7d6818db785d8ba13dc577fe61a68eb365de5661f43d4c789bb117a3d208ae44a381b718b3157e218959156ff8e92b7e92bc275d2c9114547351a0d0f2a70d13be0194b6cb68b03000000000000004f153bbc7f52861e4e5df0d19e4e40ac44cfda6f87807e5b5ed7072c04da88afd3d4b79f060e004a0e2f00b9e726ac75d2ac0691314c627e9a8a07bdd607919fd48f01ad6d2f7621d9a75b134f1bc25ed7c33d411a5baa4daa3add16afc502b2b7629541d722e91d631e5ffb9d4beb5aa5a2c4e490a5bd5cf4538ba310b8cbc221af38ea842d4cb908bcd574f794459fd54b58c6a791e6df620047bade4ba41ee014184395a479544619f749ff70088b0fd115077f7eff7c5a3315ca604d110df1c54407f191a78d8362e4dc6e1138391c2a65246779bb76c9f1daea4f085f38810edef6dd047937c231cba791a4e7713c5b3b0a0b6ba37db5016e02d114d714459d065a79609fea4efebad04edac11aac0e53dd094827453144fa419ee81823d00a90a9058ba740d2f41253a8d01a8c1a7265a084e30ad10d412aee8170a7111d62473e7bd8f3d64fb7ebdd32aada331900000000000000000000000084ef49dd02000000bf48ea48e0e1f463d9dcb285038ec38d5f4969ed0e98a71ac7bf8159a234833a5241722b2d24aa2fa4965d4eb7966fb27d118b6ef3308627e67d42f1041d5e92da28e0a7724ce715854775cbe06c5166f1dac0745f1373156a536cb6394c2c4473e2050cacf693fdf8e305080000001a901ecd90a5f53b8327a485557bc2a147b036477915e600000000034258ebbb6099b597d17ee2fc97ca850b8580b1337016a40566814594c13052b9d2b0741326825f19a244609ac04a0c29691a7c8f7a78c1a7590a293c561f304533c638ae635f5ce026f7fa034d8cfe0e11831d4829692beab26891ef583cfcb713a4d3a2d8b958c0875d7e4bdcf98802db086ebcbb9d82fa569a18f06facc2ffe1ea9ae4231e1e7a5dd7503faa2de7f898c97788c4b9c61c70ff92abdf7476cc351156d11c0ada7614f315f4c6cca119d16827d4e864f5a7a9b690272a510c451dc07f391309d02e31e53b2bf0b5f86e776b1bcfe6c85ccd7ddf8a9559d58bb5603895f265685fdd11263c946f8ef3ccec1b0d45a47a89b8237cbbdab14e4ca6dc76b2c41e071b93a065c0f5aa718e1cfab29beea78a6bd9a3114f0fb92be9a5862627b4bd99db2c08e4636e43f05f33535d5d1f9bb40e1fd8e5125a3d29b31dd94a6744bbc21722222b976089f073a4d3fcafc6d06518cf0c4fc6c8e3da0000000000000000000000007d3b60775243f2143d9f54804b11102cf0e4c641db1ba8bf75e46ab3a8fdece6562e7ebb3e407f3c7504dfa3da3aecbd49af3d1edeea11cc970416fadeedc8423bfdc85041ac4d8243a1130e6f4cb5bbfed9d095e18c98c7d690e4c491a7ddcd5635bc61dbed719ca28e8ca3f1fbbe588913ed057f1d6e34a79f4dc10df54d1993a5bc5f9ef6dbd339ee4b0b5764169f305e284ef82cc23e9366d4bc7eb45c7230b13433e5240657cb8eba33260147be8620b6d98cc48b000000000000000000000000c1ce872b18984f080100000000000000bd3fded92547d41809b398f36749083a147eb09ff1ed601bd36b873d3947fb223da647052528e0466cb917db7800f7c7000b593fca1903991cca1343882e3a1f60044f11c081dae4fc5bcf20efacdd2c577f4bcda2eea6f75a31dc90eebb6135b6fb824052181b0ad8a49ebf03ccf61d7e39bf6b0762d24d19796016301d1415b5110ba9df7f204aedb2a2e4e621c0553d312b309db67192f98ef7800000d629c04e216afc8fc66616bbf304e452373aa927c2ad6f5417f1b9bc322b802c1c42112a92a331cdc113b9ace3ff52ede7a853f9a89002ba070bac2f635a03db3375e5564f1a798bf9c0f8c72725d2eca9b0ec7e453d78ea20eca61530fe574299b393ca144adcb06108dfbb934065a87972739150a8752ac111c4d9062ccb95c54034fbdee131d94dfbaab1854d55665746fb7b47d25e54070b0d14c0a29c57bc4930075e1761913b036d43852c6df9f10e15105b2a18668298a3577943514db0dce953dcec62139ff3f16066efec5d8cbc0600000000007289be5883aab951ea67cf2ff691d05c1ea91dd569ed9897fe8d88a0a6977dc8955be17e8026aff11c61fa5cc76196c1423cd597345253baa1537eb6962a3ce1fe5d5ab46938e8fb23fa7047bc59c4345e912585a9adb5fe2ff51b64a326321b594e3f2d339f4090bdae6b30b62064bacbc155d3c930576f506b093ca7c60957bdfdd6536baaa871cf6a603c736b78761e6463b8ac503e219cc3d98f649602ad24d5667368290ee926fba76ee482a201a03efece3b236f4ee2ffcd5d90d92a2f0c5cfa48c87f27c2f1e92988a6508c12f6b7755cc48eb10edafca92cb0260c72295a27a24846d3a2334bd60e94c0fd07e5db0a4964a7fc4e89f11a300510776934e87bb3c21394f46954a012b2a3b0760f1bad1dbd6b466ed7153bd18ee2c0b2353c38df9e0782eb000000000000000000000000001b58cadcc5aaf65e05663985a177aa1d1ea2ad1b8151c7d58f5b92827f550269b3585d98e1394e816a477e52ce2f6de2bd7192f46cf965e774968d151d2bda084b10ec4c8d2c6ab582b1e5e3ed874235ff128c661298ed75879d8a4025ad1c3d9ef6355dc7284c6e648a61da026a777fcc7ae2c60ce64a2f2b0000000000000000000000000000003022110d1230e998429a6fd8f35939a8ae5acc89125539d84b98df6f8ee2ad0b238759bf400ac14c591aefe9660076a494f73b0ea8f3cb4a9c2e4f745a2afb593fabb9481600b2f44e64dcb0d0d57d5aeae626d2700608bb283800000000008a4c26b16213f0d9d7c3c57413b1e5895c9c12259519274ca8fd3bce804c8176a297f28add10956f3aaa3db687abcc17d326fd3674b7680206e875332b82c1de5ff793f6971d98c787c6daef28f66b542f08eeb6c82fbe03a3dc625bddf98d2a200c94065db5d5414361a785ff39392d9b1c870d8a2287af0ee98231100efa30652f2dd84da00970b5d209c623b26770258fcf63690f17cce7a78aeba7f6cbc4c143f48b1d0a10afdc93eaaff72e6622fd4da72ca7b30cd30b568599a6b44a2dee51985d802ed8088391a6717c4d97"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfe37}, 0x48) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x5, 0x2, 0x3, 0xf8, 0x0, 0x0, 0x70, 0xe, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xe, 0x2, @perf_bp={&(0x7f0000000080), 0x8}, 0x2, 0x1, 0x4b, 0x3, 0x100000001, 0x2, 0x7, 0x0, 0xff, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000003e"], 0x0}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x2, 0x4, 0x1, 0x1}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x4, [{0x0, 0x3, 0x20000000}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x6, 0x2}]}}, 0x0, 0x4a}, 0x28) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000380)={r3, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000a80)={r3, &(0x7f0000000940)="18", &(0x7f0000000980)=""/235}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETFEATURES(r4, 0x5452, &(0x7f00000013c0)) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000140)=r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="b907ef19edfff007049e0ff0888e", 0x0, 0x102a, 0x18000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000740)={&(0x7f0000000440)="a44e3b556f246c3016e57c3861afc7bb3f5f20a701fe885ae5a23cec6721849214278f35e62aa9486b164ffc8e89004d8089c60c2fc5b41a84aa1d253252c36bcdeadbf86bb8e6aef760394620821cc36140d4b0635dfec08c467685a0a69398b4723f1d15e0ba1f12565b45030f56f7e64b49dae72e78f44b8499adce59cbc9789fe133ad84156006c302bb63ac72d2469e967c02397ee5e45b78c84b6554093c27a5703b93d710bf6a5953f73c0bda8bfe7eb353f087d59b64a8d4c27bd892f68503f42eec426cab300df57430d98fa5d2d13bf8fb91a56ced7027cc4c966e452f2b1e8eff0b4c1400214315885b23981c68a487a1921c2fdb7f9d8e7f", &(0x7f0000000540)=""/79, &(0x7f00000005c0)="b74aa64b4a72b8afe6be54e2b9322b8def84e28de48869bba634a5512d6bab25aff1b2709ff2b3b75273ea73a83c13640b258990da8296d9332b15658dc787d136", &(0x7f0000000640)="5c8df3320377e27232b90ebeed48b5846188e89920288694fffa2b15827ef5bc96e1c9fd3d61f46ce42b31662cb25548a7116bd709df903bcd1672a468534a425910321b25d37a97ed13e3efb4d44edde783ad3add402d6671284abcb8e89c9ddbd88de13a33c824e4107333ad96430720eb0f63cafd4a6c37a1020f04c6c024d1c1991246fc5862896107a6772841f7f5ba4f9f3d000aea3bdba0e0603deeaa91c4c0d1ec98ac14e99261fbe4323f241f45d88611756a561fbde993d3a70cd8571adb2bae8d389350f6b0ae3d3d82", 0x2a, r4, 0x4}, 0x38) 35.775710211s ago: executing program 3 (id=762): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) close(0x3) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x48) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, r1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10, 0x7}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0xe38, 0x9, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r5}, &(0x7f0000000840), &(0x7f0000000880)=r4}, 0x20) close(r4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r5, &(0x7f0000000900)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x4000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x800700}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC=0x0], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x8, &(0x7f0000000c40)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000060000850000001b000000b70000000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r8}, 0xc) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000b80)={r8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002780)=@base={0x1, 0x3, 0x8, 0x8, 0x40, 0xffffffffffffffff, 0x74ebdffb}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000005d00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x230, &(0x7f0000002500)=""/4106, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0, 0x34, 0x0, 0x0, 0xfffffffffffffe65}, 0x23) 35.738289911s ago: executing program 4 (id=763): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000070060000000000000000731131000000000095000000000000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x100000000200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0}, 0x1000, 0x1, 0x0, 0x9, 0x9}, 0x0, 0x20000c, r2, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x9080, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'veth1_to_batadv\x00', 0x2010}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r6 = openat$cgroup_procs(r4, &(0x7f0000000840)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) write$cgroup_int(r5, &(0x7f0000000040), 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711807000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(&(0x7f0000000340)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000000040)=0x1) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001440)={r0, 0x0, 0x3, 0x60, &(0x7f00000002c0)="472487", &(0x7f0000001340)=""/96, 0x1, 0x0, 0x3, 0x3e, &(0x7f00000013c0)="937e60", &(0x7f0000001400)="3746cb13604fa805e90c1f0ff72513f1d62db59cfbef979e71c2eca79bfa9c0f7a6d0d55e6fe5162d1291885499d95470d4efa0d6e0ed71f93ad7f2efa27", 0x2, 0x0, 0xe7}, 0x50) r7 = syz_clone(0x94000400, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000019c0)=@bpf_tracing={0x1a, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@generic={0x9, 0xb, 0x5, 0x9, 0x9}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f00000014c0)='GPL\x00', 0x2, 0x96, &(0x7f0000001500)=""/150, 0x40f00, 0x24, '\x00', 0x0, 0x1a, r3, 0x8, &(0x7f00000018c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000001900)={0x3, 0x8, 0x63, 0x862}, 0x10, 0x211e7, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000001940)=[{0x0, 0x4, 0xc, 0xc}, {0x3, 0x3, 0x7, 0x9}, {0x4, 0x2, 0x2, 0x9}, {0x3, 0x1, 0xe, 0xa}, {0x0, 0x3, 0x6, 0xb}, {0x0, 0x3, 0xe, 0x2}], 0x10, 0x5}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r7, r8, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff00000005}, 0x0, 0x0, 0x0, 0x0, 0xb76d, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 35.342592466s ago: executing program 1 (id=764): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x122) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317080000003a40fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) (async) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000580)=@base={0x1c, 0x8, 0x7a26, 0x80000001, 0x12000, r1, 0x4, '\x00', 0x0, r3, 0x4, 0x1, 0x0, 0x0, @void, @value, @value=r1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @generic={0x79, 0x0, 0x0, 0x48}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) (async) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x100, 0x5800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000000000000, 0x0, 0x0, 0x1, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x28, &(0x7f0000000040)) (async) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="6daa00000000000071101100000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x80) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 35.204892028s ago: executing program 4 (id=765): perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000001080)=ANY=[@ANYBLOB="1800000000000000000000000052706cb11c3c0000007919b000c8660000950000000000000059cfd07c6766741498518e52b67052dc36f650113a7abb405a3a4f33b8aca071d829cdd61124958cd921f5841622a2b31e419695d8bbf999a41ee090c872f805492120913200"/123], &(0x7f0000000080)='syzkaller\x00', 0x4}, 0x94) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xc5bf) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000000000a50a000000000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x58}}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001000)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x3) 35.155872597s ago: executing program 2 (id=766): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x100000001}, 0x4000, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x3, &(0x7f00000002c0)=@framed, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="350a0000000000006911ae0000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x28}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r2, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1000000}, 0x8, 0x10, &(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4000}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 35.103771409s ago: executing program 0 (id=767): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000046090100000003e71600000006000000180100002020702500000000002020206b9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000024090000060000005c93000000000000b5030000000000008500000076000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x89, 0x89, 0x4, [@enum={0xd, 0x3, 0x0, 0x6, 0x4, [{0xb, 0x609}, {0x6, 0x9d6}, {0xc, 0x7}]}, @ptr={0x10, 0x0, 0x0, 0x2, 0x4}, @ptr={0x5, 0x0, 0x0, 0x2, 0x5}, @datasec={0x5, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x7, 0x7}, {0x5, 0x8, 0x4}], "9e"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x7}}, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x4, 0x8}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000200)=""/106, 0xa8, 0x6a, 0x1, 0x5}, 0x28) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x46, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3b81}, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xb4, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x7, 0x3}, 0xc27a, 0x40, 0x7, 0x5, 0x1, 0x200200, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000580)=""/95}, 0x20) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2c}, @initr0, @exit]}, 0x0, 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2c}, @initr0, @exit]}, 0x0, 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000001240)='(pu&\"\"\t&&\x01\x97\x82\xa6x\x11\x8f\xe1\xc9\xe3\xb6\xb3\xf9\xac\xdb\xce\xaem<#\xa3K|\xd1\xde\xab\xaa\xc9\x0eO\xd61\xd8\a\xd3p(') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000001240)='(pu&\"\"\t&&\x01\x97\x82\xa6x\x11\x8f\xe1\xc9\xe3\xb6\xb3\xf9\xac\xdb\xce\xaem<#\xa3K|\xd1\xde\xab\xaa\xc9\x0eO\xd61\xd8\a\xd3p(') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x68}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') syz_clone(0x40000000, 0x0, 0x63, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x9, 0x0, r0, 0x4, '\x00', r1, r2, 0x3, 0x5}, 0x50) 35.002150099s ago: executing program 3 (id=768): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x1000}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x9) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x500, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x9, 0x2}, 0x1000, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8982, &(0x7f0000000080)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x6e, 0xfffffffb}]}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6334ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa3c"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6, 0x9, 0x0, 0x80000000, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r9}, &(0x7f00000000c0), &(0x7f0000000100)=r1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 34.95713301s ago: executing program 4 (id=769): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="f6000000040000001800000001ed5ef11890cc3adec4e9283e2d68a593f6e10a0229c095c86720fa08bd39d33de25f7523d34b523a2cc188b0f34c00"/70, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x5, 0x90, 0x7, 0xe, 0x0, 0xfffffffffffffff2, 0x28010, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x28, 0x1, @perf_config_ext={0xe000000000000, 0xfffffffffffffc01}, 0x69e4e4d737ca5448, 0x6, 0x3d, 0x9, 0xfffeffff, 0x1, 0x5, 0x0, 0x3d2af391, 0x0, 0xf}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1e032800008c71ef288563"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x20, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3ff}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x19}, @jmp={0x5, 0x0, 0x0, 0x5, 0xa, 0x80, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x435}}]}, &(0x7f0000000880)='GPL\x00', 0x2, 0xdb, &(0x7f00000008c0)=""/219, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000a00)={0x5, 0x3, 0x1, 0xa}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000a40)=[r0, r0], &(0x7f0000000a80)=[{0x0, 0x5, 0x10, 0x8}, {0x0, 0x3, 0x10, 0x9}, {0x1, 0x3, 0x8, 0x5}, {0x1, 0x5, 0x2, 0x4}, {0x1, 0x4, 0xb, 0x6653d6151cd2bff8}, {0x1, 0x3, 0x3, 0x1c}], 0x10, 0x5}, 0x94) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000740)={&(0x7f0000000180)="952dbfd1b27c373ba44f89c24ff99403477fb2e8181f0c22c3a587a48ef0c8d7cb75b05d87a7b8f3c81b7976695f10cd1c3188b6ec6ff8aa345754f103eb5c4cfd484a8fb9752e141a08ffa9dcef95b048", &(0x7f0000000280)=""/183, &(0x7f0000000340)="e42012c29d8ebcecc4f04ff1773ad9528e04a474a9c3e7150f3797372130327bab43edad736853224cce1cf719efa573", &(0x7f00000004c0)="8db26759e27d5e9e9116bab8a00be6d77eb683262cedcc8e34dfeb805784fd06bea17ddba065e6faa74d21634cabb2cbf35c2c3d76fed239caa45a10e0fabefeffb9ea22eeaa778b1c34632611ade092e97f1bbe8cc96075c64b6ff5294dd0310e15972ebe346e326f543ac5887b0f75c9a58adf874a5d05a41d631612e9f2bde959439ede76c98d52b6732c32678a0196252060ac66f9045dffc230e15a91199cd9298c87f9489b541abe9d1b05a50c99874d6e8fe0858170663474f20a5ccbe884eac7ec5feef654a5a56d257675aff231", 0x1000, r0, 0x4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) 34.684160653s ago: executing program 2 (id=770): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18aff1891e000000950000000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000c00000008"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, 0x0, &(0x7f0000000340)=""/166}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0xfffffffffffffffe, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000200000408000000000000000300000000000000000000000200000000000000000000000000000d000000000000000000000004"], 0x0, 0x56}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRESOCT=0x0], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x42, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={0x0}, 0x448, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xb, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 34.682751393s ago: executing program 3 (id=771): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x8982, 0x20000000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000680), 0x4800, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000004c0)=""/215) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000e0000000008000000181100fb000700d3494a69e58313993818ba3bb45c585de2e3e13ff6423712f07100d05696d0fa2ed01d54957558cd4d3ce3cae850d369bf3871f824877186f191d7243137fd72e9e53ef3a0a3de63d74686547a28f49d887a2c4302f6462f448034c29091afef2c3fe2272609109bf41c0aca691a8717ec21a7e09fb352bf5da71151ccd9789addad0615274aa801414e7a48267fe07edc32bff349974271e7652f1813824be5a3149b519ea61fcdc77f6ad63b03523864931493fc", @ANYRES32=r5, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r6) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) r7 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1ff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB="d024f28120e1df1b2b377788bd5cf3de431be5047dc6f23537d0f548139f09d786abf6712e2ae7d4b1f2d83ecdbbfc3c680c8c27b5706dda06a8443d4a0a4ee6f626ae98aa4b2d233b82cacb21924cfcd2afe4c355385e859663b9e0e150dc63782f2fddbeb71438a2560e71792d791e91b9d3db883b64a8b1b22e9b58c0ee814c1841effc4b78cb90cf56cf33e0f3470da091575b749bb117e6e19a92f2b660fe98b59ac1cfe097f4d4a70c2bd329370f8e2bff8ee600fe0c64e06e586941533cab96941983d3581a689edbac8d7552f4ee4cb91ab8df43a5f4e8fb3ad929c3127c78b390"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x59d}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 34.442578656s ago: executing program 1 (id=772): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) (async) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) (async) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xc}, 0x4a01}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000400)=0x99) 34.441322266s ago: executing program 4 (id=773): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002300)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x3f, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f00000005c0)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000380)=r3}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xce469acae6db1c4f, 0x1, 0xfff, 0x9, 0x10410, r4, 0x8, '\x00', r5, r1, 0x0, 0x2, 0x2, 0x0, @void, @value, @value=r3}, 0x50) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xfffffeff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10029}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r8 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x204, 0x0, &(0x7f0000000040)="5aee41dea43e63a3f7fb7f11c72b", 0x0, 0x23b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 34.325434027s ago: executing program 1 (id=774): bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0309"], 0x50) socketpair(0xb, 0x800, 0x829, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x50}}]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000027c0)={r2, 0xe0, &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002500)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000002540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002580)=[0x0, 0x0], 0x0, 0x37, &(0x7f00000025c0)=[{}], 0x8, 0x10, &(0x7f0000002600), &(0x7f0000002640), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000002680)}}, 0x10) sendmsg$inet(r1, &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @local, @dev={0xac, 0x14, 0x14, 0x1b}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6f7d}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@generic={0x44, 0x4, "9f1d"}, @end, @lsrr={0x83, 0x13, 0xc0, [@remote, @remote, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x3, 0x7b}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0xb0}, 0x4090) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000008000000000000000000018010000", @ANYRES32, @ANYRES64=r0], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 30.074368994s ago: executing program 1 (id=775): r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000340), 0x8}, 0x3c13, 0x2000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x30, 0x0, 0xffffffffffffffff}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0xfffffffa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x23, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x50) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r5, @ANYRESOCT=r3, @ANYRES8=r2], 0x36) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23ffffff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000008000000020000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\b\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0xff6f, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r1}, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@cgroup=r9, 0x31, 0x0, 0xe8000000, &(0x7f0000000580)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000280), &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0]}, 0x40) 27.888626989s ago: executing program 4 (id=776): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000000006b119800000000008510000002000000850000000500000095003300000000009500a50500000000cfb916cfb1841e8e83c8d00c2a06d3fd305b68b234e73739634ac40c039206000000000000009b0cac928bd5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000e30000000500000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000440), &(0x7f00000005c0)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000040), &(0x7f00000002c0)}, 0x20) socketpair(0xb, 0x800, 0x829, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000027c0)={r2, 0xe0, &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000002540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002580)=[0x0, 0x0], 0x0, 0x37, &(0x7f00000025c0)=[{}], 0x8, 0x10, &(0x7f0000002600), &(0x7f0000002640), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000002680)}}, 0x10) sendmsg$inet(r1, &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="0000000000000100000000000000", @ANYRES32=r3, @ANYBLOB="ac1414aaac14141b00000000110000000000000000000000010000000400000000000000140000000000000000000000020000000900000000000000140000000000000000000000020000000200000000000000140000000000000000000000010000007d6f0000000000002c00000000000000000000000700000044049f1d008313c0ac1414bbac1414bb7f000001ac1e000189037b0000000000110000000000000000000000010000000700000000000000"], 0xc8}, 0x4090) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xf, 0x97c, 0x0, 0x4, 0x10, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x10, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0x8f}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='syzkaller\x00', 0x7, 0x5, &(0x7f00000002c0)=""/5, 0x0, 0x40, '\x00', r3, 0x25, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000680)=[r5], &(0x7f00000006c0)=[{0x1, 0x3, 0x0, 0xe}], 0x10, 0x10000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000000000000a000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r6, 0x124, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000001e40)}}, 0x10) r7 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x12, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000031000000850000006b00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_devices(r7, &(0x7f0000000180)=ANY=[@ANYBLOB="a1c65f863563202a"], 0x8) 24.092466161s ago: executing program 4 (id=777): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="d405000000000000611014000000000025"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000f0ffffff0000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)={[{0x2d, 'net_prio'}]}, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0xc, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000000000000000000000000000885000000110000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000b986c12a850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 19.592856811s ago: executing program 32 (id=767): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000046090100000003e71600000006000000180100002020702500000000002020206b9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000024090000060000005c93000000000000b5030000000000008500000076000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x89, 0x89, 0x4, [@enum={0xd, 0x3, 0x0, 0x6, 0x4, [{0xb, 0x609}, {0x6, 0x9d6}, {0xc, 0x7}]}, @ptr={0x10, 0x0, 0x0, 0x2, 0x4}, @ptr={0x5, 0x0, 0x0, 0x2, 0x5}, @datasec={0x5, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x7, 0x7}, {0x5, 0x8, 0x4}], "9e"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x7}}, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x4, 0x8}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000200)=""/106, 0xa8, 0x6a, 0x1, 0x5}, 0x28) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x46, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3b81}, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xb4, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x7, 0x3}, 0xc27a, 0x40, 0x7, 0x5, 0x1, 0x200200, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000580)=""/95}, 0x20) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2c}, @initr0, @exit]}, 0x0, 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2c}, @initr0, @exit]}, 0x0, 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000001240)='(pu&\"\"\t&&\x01\x97\x82\xa6x\x11\x8f\xe1\xc9\xe3\xb6\xb3\xf9\xac\xdb\xce\xaem<#\xa3K|\xd1\xde\xab\xaa\xc9\x0eO\xd61\xd8\a\xd3p(') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000001240)='(pu&\"\"\t&&\x01\x97\x82\xa6x\x11\x8f\xe1\xc9\xe3\xb6\xb3\xf9\xac\xdb\xce\xaem<#\xa3K|\xd1\xde\xab\xaa\xc9\x0eO\xd61\xd8\a\xd3p(') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x68}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') syz_clone(0x40000000, 0x0, 0x63, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x9, 0x0, r0, 0x4, '\x00', r1, r2, 0x3, 0x5}, 0x50) 8.420345576s ago: executing program 33 (id=775): r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000340), 0x8}, 0x3c13, 0x2000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x30, 0x0, 0xffffffffffffffff}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0xfffffffa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x23, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x50) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r5, @ANYRESOCT=r3, @ANYRES8=r2], 0x36) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23ffffff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000008000000020000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\b\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0xff6f, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r1}, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@cgroup=r9, 0x31, 0x0, 0xe8000000, &(0x7f0000000580)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000280), &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0]}, 0x40) 1.099309108s ago: executing program 34 (id=770): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18aff1891e000000950000000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000c00000008"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, 0x0, &(0x7f0000000340)=""/166}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0xfffffffffffffffe, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000200000408000000000000000300000000000000000000000200000000000000000000000000000d000000000000000000000004"], 0x0, 0x56}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRESOCT=0x0], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x42, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={0x0}, 0x448, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xb, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 591.319674ms ago: executing program 35 (id=771): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x8982, 0x20000000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000680), 0x4800, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000004c0)=""/215) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000e0000000008000000181100fb000700d3494a69e58313993818ba3bb45c585de2e3e13ff6423712f07100d05696d0fa2ed01d54957558cd4d3ce3cae850d369bf3871f824877186f191d7243137fd72e9e53ef3a0a3de63d74686547a28f49d887a2c4302f6462f448034c29091afef2c3fe2272609109bf41c0aca691a8717ec21a7e09fb352bf5da71151ccd9789addad0615274aa801414e7a48267fe07edc32bff349974271e7652f1813824be5a3149b519ea61fcdc77f6ad63b03523864931493fc", @ANYRES32=r5, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r6) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) r7 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1ff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB="d024f28120e1df1b2b377788bd5cf3de431be5047dc6f23537d0f548139f09d786abf6712e2ae7d4b1f2d83ecdbbfc3c680c8c27b5706dda06a8443d4a0a4ee6f626ae98aa4b2d233b82cacb21924cfcd2afe4c355385e859663b9e0e150dc63782f2fddbeb71438a2560e71792d791e91b9d3db883b64a8b1b22e9b58c0ee814c1841effc4b78cb90cf56cf33e0f3470da091575b749bb117e6e19a92f2b660fe98b59ac1cfe097f4d4a70c2bd329370f8e2bff8ee600fe0c64e06e586941533cab96941983d3581a689edbac8d7552f4ee4cb91ab8df43a5f4e8fb3ad929c3127c78b390"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x59d}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 36 (id=777): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="d405000000000000611014000000000025"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000f0ffffff0000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)={[{0x2d, 'net_prio'}]}, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0xc, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000000000000000000000000000885000000110000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000b986c12a850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.254' (ED25519) to the list of known hosts. [ 19.969019][ T24] audit: type=1400 audit(1778414833.680:64): avc: denied { mounton } for pid=271 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.973933][ T271] cgroup: Unknown subsys name 'net' [ 19.978951][ T24] audit: type=1400 audit(1778414833.680:65): avc: denied { mount } for pid=271 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.993188][ T24] audit: type=1400 audit(1778414833.690:66): avc: denied { unmount } for pid=271 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.993666][ T271] cgroup: Unknown subsys name 'devices' [ 20.168130][ T271] cgroup: Unknown subsys name 'hugetlb' [ 20.173970][ T271] cgroup: Unknown subsys name 'rlimit' [ 20.315731][ T24] audit: type=1400 audit(1778414834.020:67): avc: denied { setattr } for pid=271 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.339007][ T24] audit: type=1400 audit(1778414834.020:68): avc: denied { mounton } for pid=271 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.363802][ T24] audit: type=1400 audit(1778414834.020:69): avc: denied { mount } for pid=271 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.383369][ T273] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 20.396102][ T24] audit: type=1400 audit(1778414834.100:70): avc: denied { relabelto } for pid=273 comm="mkswap" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.421850][ T24] audit: type=1400 audit(1778414834.110:71): avc: denied { write } for pid=273 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.454369][ T24] audit: type=1400 audit(1778414834.160:72): avc: denied { read } for pid=271 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.480184][ T24] audit: type=1400 audit(1778414834.160:73): avc: denied { open } for pid=271 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.506622][ T271] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.179338][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.186664][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.194258][ T280] device bridge_slave_0 entered promiscuous mode [ 21.201413][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.208501][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.215942][ T280] device bridge_slave_1 entered promiscuous mode [ 21.281843][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.289191][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.296820][ T279] device bridge_slave_0 entered promiscuous mode [ 21.303696][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.310887][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.318372][ T279] device bridge_slave_1 entered promiscuous mode [ 21.336645][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.343723][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.351177][ T281] device bridge_slave_0 entered promiscuous mode [ 21.360558][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.367744][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.375207][ T281] device bridge_slave_1 entered promiscuous mode [ 21.448791][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.455874][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.463330][ T282] device bridge_slave_0 entered promiscuous mode [ 21.473737][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.480868][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.488349][ T282] device bridge_slave_1 entered promiscuous mode [ 21.574995][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.582184][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.589759][ T283] device bridge_slave_0 entered promiscuous mode [ 21.596968][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.604163][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.611691][ T283] device bridge_slave_1 entered promiscuous mode [ 21.634521][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.641632][ T280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.648962][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.656028][ T280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.686987][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.694338][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.701684][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.708740][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.752543][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.759637][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.766947][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.774076][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.786489][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.793573][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.800868][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.807934][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.825426][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.832792][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.840144][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.848079][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.855258][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.863470][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.870720][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.878443][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.885612][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.895965][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.903547][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.920299][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.928560][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.935791][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.952112][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.960377][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.967465][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.974899][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.983401][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.990509][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.999343][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.007619][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.014689][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.026957][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.049341][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.062940][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.071824][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.078962][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.109922][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.118183][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.127234][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.135607][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.143722][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.151313][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.159426][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.167829][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.174903][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.182552][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.190827][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.197974][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.205354][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.213499][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.221602][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.229931][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.236993][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.253466][ T279] device veth0_vlan entered promiscuous mode [ 22.266935][ T280] device veth0_vlan entered promiscuous mode [ 22.274735][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.283509][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.292276][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.300979][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.309036][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.317373][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.325639][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.333937][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.342125][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.349587][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.360515][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.368113][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.381826][ T280] device veth1_macvtap entered promiscuous mode [ 22.392380][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.400704][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.409220][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.417218][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.425526][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.434072][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.442860][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.451361][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.458405][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.465919][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.474210][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.482354][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.492770][ T279] device veth1_macvtap entered promiscuous mode [ 22.506018][ T282] device veth0_vlan entered promiscuous mode [ 22.513803][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.522148][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.531078][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.539173][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.547649][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.555552][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.564102][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.573125][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.581481][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.590001][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.598188][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.606534][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.614041][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.632714][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.641745][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.650930][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.659603][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.668085][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.676737][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.684909][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.692089][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.699695][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.707822][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.727652][ T282] device veth1_macvtap entered promiscuous mode [ 22.741334][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.749427][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.749765][ T280] request_module fs-gadgetfs succeeded, but still no fs? [ 22.758286][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.773598][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.781862][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.790000][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.798516][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.809029][ T281] device veth0_vlan entered promiscuous mode [ 22.816723][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.824687][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.834778][ T280] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 22.845233][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.852782][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.870961][ T283] device veth0_vlan entered promiscuous mode [ 22.895113][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.907328][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.915800][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.926271][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.934715][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.943604][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.952308][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.960499][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.969473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.978135][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.986518][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.994044][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.010425][ T281] device veth1_macvtap entered promiscuous mode [ 23.020581][ T283] device veth1_macvtap entered promiscuous mode [ 23.027953][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.037131][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.045062][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.078422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.092250][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.102294][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.110995][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.121922][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.131093][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.140019][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.148784][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.226039][ T325] cgroup: syz.1.6 (325) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 23.243170][ T325] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 23.434929][ T337] device syzkaller0 entered promiscuous mode [ 23.767400][ C1] hrtimer: interrupt took 37336 ns [ 24.096871][ C0] Illegal XDP return value 16128, expect packet loss! [ 24.159313][ T400] sock: sock_set_timeout: `syz.3.29' (pid 400) tries to set negative timeout [ 25.178790][ T490] device veth1_macvtap left promiscuous mode [ 27.155382][ T590] device ip6gre0 entered promiscuous mode [ 27.899396][ T24] kauditd_printk_skb: 47 callbacks suppressed [ 27.899408][ T24] audit: type=1400 audit(1778414841.610:121): avc: denied { create } for pid=632 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 28.705319][ T24] audit: type=1400 audit(1778414842.410:122): avc: denied { create } for pid=678 comm="syz.2.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 29.226017][ T24] audit: type=1400 audit(1778414842.930:123): avc: denied { write } for pid=728 comm="syz.3.119" name="cgroup.subtree_control" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 29.292082][ T24] audit: type=1400 audit(1778414842.930:124): avc: denied { open } for pid=728 comm="syz.3.119" path="" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 29.333961][ T24] audit: type=1400 audit(1778414842.930:125): avc: denied { ioctl } for pid=728 comm="syz.3.119" path="" dev="cgroup2" ino=129 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 29.417801][ T24] audit: type=1400 audit(1778414843.130:126): avc: denied { create } for pid=741 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 29.546927][ T24] audit: type=1400 audit(1778414843.250:127): avc: denied { create } for pid=748 comm="syz.4.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 31.431559][ T24] audit: type=1400 audit(1778414845.130:128): avc: denied { create } for pid=859 comm="syz.3.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 32.462658][ T24] audit: type=1400 audit(1778414846.160:129): avc: denied { create } for pid=897 comm="syz.2.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 32.536190][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 33.858596][ T974] device syzkaller0 entered promiscuous mode [ 35.790399][ T24] audit: type=1400 audit(1778414849.500:130): avc: denied { create } for pid=1106 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 35.839670][ T1107] device wg2 entered promiscuous mode [ 35.979069][ T1110] device wg2 entered promiscuous mode [ 37.280853][ T1160] device wg2 entered promiscuous mode [ 37.892772][ T24] audit: type=1400 audit(1778414851.600:131): avc: denied { create } for pid=1203 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 38.742706][ T24] audit: type=1400 audit(1778414852.450:132): avc: denied { attach_queue } for pid=1226 comm="syz.0.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 38.838796][ T24] audit: type=1400 audit(1778414852.550:133): avc: denied { create } for pid=1237 comm="syz.3.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.861744][ T1238] ------------[ cut here ]------------ [ 38.868014][ T1238] trace type BPF program uses run-time allocation [ 38.875112][ T24] audit: type=1400 audit(1778414852.580:134): avc: denied { create } for pid=1229 comm="syz.4.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 38.895205][ T1238] WARNING: CPU: 1 PID: 1238 at kernel/bpf/verifier.c:10518 check_map_prog_compatibility+0x5d6/0x740 [ 38.906103][ T1238] Modules linked in: [ 38.910181][ T1238] CPU: 1 PID: 1238 Comm: syz.3.266 Not tainted syzkaller #0 [ 38.918147][ T1238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 38.935115][ T1238] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 38.942086][ T1238] Code: 85 e9 14 fe ff ff e8 99 d1 ef ff 31 c0 e9 15 fe ff ff e8 8d d1 ef ff c6 05 85 b6 4b 05 01 48 c7 c7 20 d1 25 85 e8 ca 1c 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 38.962084][ T1238] RSP: 0018:ffffc90000e7f448 EFLAGS: 00010246 [ 38.968411][ T1238] RAX: c7644583f0b19e00 RBX: 0000000000000001 RCX: 0000000000080000 [ 38.986271][ T1238] RDX: ffffc900038e4000 RSI: 0000000000001cbf RDI: 0000000000001cc0 [ 38.994464][ T1238] RBP: ffffc90000e7f490 R08: ffff8881f7152fbf R09: 1ffff1103ee2a5f7 [ 39.002673][ T1238] R10: dffffc0000000000 R11: ffffed103ee2a5f8 R12: ffff888137a40000 [ 39.016263][ T1238] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88812722c800 [ 39.029318][ T1238] FS: 00007f36d72266c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 39.044445][ T1238] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.062132][ T1238] CR2: 00007f36d88194c0 CR3: 00000001364c4000 CR4: 00000000003506a0 [ 39.076442][ T1238] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 39.095141][ T1238] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 39.106197][ T1238] Call Trace: [ 39.111254][ T1238] ? __fdget+0x1a1/0x230 [ 39.116331][ T1238] resolve_pseudo_ldimm64+0x55e/0x1060 [ 39.121883][ T1238] ? bpf_check+0xdb10/0xdb10 [ 39.135243][ T1238] ? kvmalloc_node+0x88/0x130 [ 39.140171][ T1238] bpf_check+0x9058/0xdb10 [ 39.145760][ T1238] ? bpf_get_btf_vmlinux+0x60/0x60 [ 39.153679][ T1238] ? is_bpf_text_address+0x177/0x190 [ 39.163433][ T1238] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.171288][ T1238] ? __kernel_text_address+0xa0/0x100 [ 39.184386][ T1238] ? unwind_get_return_address+0x4d/0x90 [ 39.193441][ T1238] ? stack_trace_save+0xf0/0xf0 [ 39.200601][ T1238] ? arch_stack_walk+0xee/0x140 [ 39.210540][ T1238] ? stack_trace_save+0xa6/0xf0 [ 39.218817][ T1238] ? stack_trace_snprint+0xf0/0xf0 [ 39.227431][ T1238] ? __kasan_slab_alloc+0x69/0xf0 [ 39.235956][ T1238] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.244367][ T1238] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.254351][ T1238] ? __kasan_kmalloc+0xec/0x110 [ 39.262575][ T1238] ? __kasan_kmalloc+0xda/0x110 [ 39.270842][ T1238] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 39.280895][ T1238] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.305202][ T1238] ? security_bpf_prog_alloc+0x62/0x90 [ 39.336207][ T1238] ? bpf_prog_load+0x9d8/0x14a0 [ 39.348060][ T1238] ? __se_sys_bpf+0x49a/0x740 [ 39.352819][ T1238] ? __x64_sys_bpf+0x7b/0x90 [ 39.361564][ T1238] ? do_syscall_64+0x31/0x40 [ 39.386260][ T1238] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.392529][ T1238] ? memset+0x35/0x40 [ 39.400853][ T1238] ? bpf_obj_name_cpy+0x193/0x1e0 [ 39.405955][ T1238] bpf_prog_load+0xfca/0x14a0 [ 39.437757][ T1238] ? map_freeze+0x320/0x320 [ 39.492953][ T1238] ? selinux_bpf+0xc7/0xf0 [ 39.570913][ T1238] ? security_bpf+0x82/0xa0 [ 39.575498][ T1238] __se_sys_bpf+0x49a/0x740 [ 39.608048][ T1259] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 39.676236][ T1238] ? __x64_sys_bpf+0x90/0x90 [ 39.680926][ T1238] ? __sys_socketpair+0xf7/0x590 [ 39.685894][ T1238] ? __kasan_check_read+0x11/0x20 [ 39.761392][ T1238] __x64_sys_bpf+0x7b/0x90 [ 39.796776][ T1238] do_syscall_64+0x31/0x40 [ 39.801259][ T1238] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.841191][ T1238] RIP: 0033:0x7f36d87cbdd9 [ 39.845834][ T1238] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 39.946465][ T1238] RSP: 002b:00007f36d7226028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 39.955176][ T1238] RAX: ffffffffffffffda RBX: 00007f36d8a44fa0 RCX: 00007f36d87cbdd9 [ 39.964756][ T1238] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 39.991489][ T1238] RBP: 00007f36d8861d69 R08: 0000000000000000 R09: 0000000000000000 [ 39.999921][ T1238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 40.012372][ T1238] R13: 00007f36d8a45038 R14: 00007f36d8a44fa0 R15: 00007fffb4e42c78 [ 40.030610][ T1238] ---[ end trace fee0b7572926011a ]--- [ 40.628787][ T1303] device syzkaller0 entered promiscuous mode [ 43.222697][ T24] audit: type=1400 audit(1778414856.930:135): avc: denied { create } for pid=1389 comm="syz.3.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 44.069480][ T24] audit: type=1400 audit(1778414857.780:136): avc: denied { create } for pid=1433 comm="syz.4.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 44.941200][ T24] audit: type=1400 audit(1778414858.650:137): avc: denied { ioctl } for pid=1479 comm="syz.1.331" path="socket:[19741]" dev="sockfs" ino=19741 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.967332][ T1482] device syzkaller0 entered promiscuous mode [ 45.050024][ T1494] device sit0 entered promiscuous mode [ 46.831144][ T24] audit: type=1400 audit(1778414860.540:138): avc: denied { create } for pid=1574 comm="syz.3.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 48.904498][ T1728] device syzkaller0 entered promiscuous mode [ 50.061894][ T1778] device syzkaller0 entered promiscuous mode [ 50.645906][ T1820] tun0: tun_chr_ioctl cmd 1074025675 [ 50.662094][ T1820] tun0: persist enabled [ 50.693615][ T1820] tun0: tun_chr_ioctl cmd 1074025675 [ 50.701697][ T1820] tun0: persist disabled [ 51.057745][ T1846] syz.1.426 uses obsolete (PF_INET,SOCK_PACKET) [ 53.142000][ T1968] bridge0: port 3(veth0_to_bridge) entered blocking state [ 53.153907][ T1968] bridge0: port 3(veth0_to_bridge) entered disabled state [ 53.173028][ T1968] device veth0_to_bridge entered promiscuous mode [ 53.188217][ T1968] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 53.211706][ T1968] bridge0: port 3(veth0_to_bridge) entered blocking state [ 53.218909][ T1968] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 54.089885][ T24] audit: type=1400 audit(1778414867.800:139): avc: denied { create } for pid=1995 comm="syz.4.468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 54.564490][ T24] audit: type=1400 audit(1778414868.270:140): avc: denied { create } for pid=2038 comm="syz.4.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 55.126637][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 55.138817][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 55.150954][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 55.163117][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 55.175441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 55.187535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 55.199665][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 55.211744][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 55.224114][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 55.236235][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 57.645171][ T2187] geneve1: tun_chr_ioctl cmd 2147767521 [ 58.255894][ T24] audit: type=1400 audit(1778414871.960:141): avc: denied { create } for pid=2214 comm="syz.3.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 59.581990][ T2265] device syzkaller0 entered promiscuous mode [ 60.136527][ C0] net_ratelimit: 76714 callbacks suppressed [ 60.136575][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 60.155638][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 60.169090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 60.182099][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 60.195129][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 60.207934][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 60.220073][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 60.232148][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 60.244640][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 60.256747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 60.420942][ T2278] device syzkaller0 entered promiscuous mode [ 62.631317][ T2359] ±ÿ: renamed from team_slave_1 [ 62.698014][ T24] audit: type=1400 audit(1778414876.410:142): avc: denied { create } for pid=2363 comm="syz.3.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 62.820751][ T24] audit: type=1400 audit(1778414876.530:143): avc: denied { create } for pid=2370 comm="syz.3.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 63.164773][ T2381] device syzkaller0 entered promiscuous mode [ 63.234083][ T24] audit: type=1400 audit(1778414876.940:144): avc: denied { create } for pid=2382 comm="syz.4.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 63.985114][ T2404] device syzkaller0 entered promiscuous mode [ 64.454291][ T24] audit: type=1400 audit(1778414878.160:145): avc: denied { create } for pid=2420 comm="syz.2.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 65.146213][ C0] net_ratelimit: 82811 callbacks suppressed [ 65.146240][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 65.164304][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 65.176359][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 65.188566][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 65.200667][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 65.212793][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 65.224834][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 65.236952][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 65.249024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 65.261143][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 67.390029][ T2477] device syzkaller0 entered promiscuous mode [ 68.072812][ T2505] device syzkaller0 entered promiscuous mode [ 68.466778][ T24] audit: type=1400 audit(1778414882.180:146): avc: denied { create } for pid=2514 comm="syz.3.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 70.156167][ C0] net_ratelimit: 75914 callbacks suppressed [ 70.156183][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 70.174375][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 70.186509][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 70.198672][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 70.210775][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 70.222924][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 70.235028][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 70.247154][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 70.259273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 70.271412][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 72.739595][ T2627] geneve1: tun_chr_ioctl cmd 1074025675 [ 72.745292][ T2627] geneve1: persist disabled [ 72.926245][ T2628] geneve1: tun_chr_ioctl cmd 1074025675 [ 72.982482][ T24] audit: type=1400 audit(1778414886.690:147): avc: denied { create } for pid=2634 comm="syz.1.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 73.011990][ T2628] geneve1: persist disabled [ 74.781755][ T2672] tap0: tun_chr_ioctl cmd 1074025673 [ 75.166211][ C0] net_ratelimit: 93164 callbacks suppressed [ 75.166223][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 75.184555][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 75.196643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 75.208765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 75.220823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 75.232916][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 75.245019][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 75.257155][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 75.269231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 75.281429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 75.498362][ T2686] b‹¡Y­4`Ò˜: renamed from lo [ 76.493693][ T2723] ref_ctr_offset mismatch. inode: 0x2da offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 77.579987][ T2753] device syzkaller0 entered promiscuous mode [ 77.823661][ T2757] +: renamed from team_slave_1 [ 79.825567][ T2792] device syzkaller0 entered promiscuous mode [ 80.176180][ C0] net_ratelimit: 83396 callbacks suppressed [ 80.176193][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 80.194358][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 80.206511][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 80.218590][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 80.230694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 80.242731][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 80.254802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 80.266933][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 80.278986][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 80.291063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 84.996352][ T3019] device syzkaller0 entered promiscuous mode [ 85.053336][ T3022] device syzkaller0 entered promiscuous mode [ 85.186301][ C0] net_ratelimit: 62015 callbacks suppressed [ 85.186316][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 85.204354][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 85.216482][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 85.228825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 85.240904][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 85.253033][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 85.265270][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 85.277391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 85.289522][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 85.302263][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 86.054178][ T3048] device syzkaller0 entered promiscuous mode [ 86.444910][ T3053] bridge0: port 3(gretap0) entered blocking state [ 86.462534][ T3053] bridge0: port 3(gretap0) entered disabled state [ 86.507231][ T3053] device gretap0 entered promiscuous mode [ 86.553711][ T3053] bridge0: port 3(gretap0) entered blocking state [ 86.560410][ T3053] bridge0: port 3(gretap0) entered forwarding state [ 87.987912][ T3090] device syzkaller0 entered promiscuous mode [ 90.196249][ C1] net_ratelimit: 45957 callbacks suppressed [ 90.196400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 90.202373][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 90.214504][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 90.228207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 90.238294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 90.252472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 90.263069][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 90.276808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 90.286584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 90.300846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 95.206189][ C1] net_ratelimit: 85870 callbacks suppressed [ 95.206203][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 95.208114][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 95.212306][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 95.227527][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 95.236626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 95.261521][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 95.272466][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 95.286414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 95.305587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 95.311807][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 100.216228][ C0] net_ratelimit: 87418 callbacks suppressed [ 100.216243][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 100.216265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 100.222365][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 100.240349][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 100.246445][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 100.266650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 100.270529][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 100.286451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 100.294296][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 100.310381][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 105.226183][ C1] net_ratelimit: 78493 callbacks suppressed [ 105.226197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 105.233009][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 105.244382][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 105.259607][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 105.268275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 105.283253][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 105.292320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 105.311060][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 105.316374][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 105.330911][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 110.236135][ C1] net_ratelimit: 89886 callbacks suppressed [ 110.236149][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 110.238327][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 110.242376][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 110.259113][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 110.266400][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 110.291777][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 110.302391][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 110.320622][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 110.326451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 110.342395][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 115.246145][ C1] net_ratelimit: 54667 callbacks suppressed [ 115.246159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 115.247777][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 115.252364][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 115.279391][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 115.288639][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 115.304561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 115.312424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 115.327970][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 115.336566][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 115.353823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 120.256143][ C0] net_ratelimit: 42965 callbacks suppressed [ 120.256157][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 120.258186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 120.262566][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 120.281910][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 120.287073][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 120.307282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 120.310702][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 120.325393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 120.334582][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 120.352436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 125.266179][ C0] net_ratelimit: 85185 callbacks suppressed [ 125.266200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 125.268042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 125.272283][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 125.291351][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 125.296768][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 125.313506][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 125.320686][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 125.339909][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 125.345264][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 125.361697][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 130.276114][ C0] net_ratelimit: 92760 callbacks suppressed [ 130.277658][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 130.282133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 130.298229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 130.306548][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 130.322958][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 130.330192][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 130.349328][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 130.354606][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 130.370340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 130.378161][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 135.286175][ C1] net_ratelimit: 91714 callbacks suppressed [ 135.286216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 135.286229][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 135.292387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 135.304589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 135.322802][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 135.328697][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 135.344859][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 135.353215][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 135.366267][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 135.376933][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 140.296137][ C0] net_ratelimit: 93166 callbacks suppressed [ 140.296152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 140.296767][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 140.302315][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 140.317246][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 140.326690][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 140.344742][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 140.350922][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 140.365447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 140.375358][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 140.389334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 145.306127][ C0] net_ratelimit: 98131 callbacks suppressed [ 145.306142][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 145.306348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 145.312277][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 145.329806][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 145.336250][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 145.350665][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 145.360427][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 145.375288][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 145.384429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 145.405389][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 150.316122][ C1] net_ratelimit: 89634 callbacks suppressed [ 150.316135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 150.318188][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 150.322234][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 150.341160][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 150.346285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 150.378599][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 150.382424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 150.399864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 150.406416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 150.423789][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 155.326162][ C1] net_ratelimit: 83714 callbacks suppressed [ 155.326176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 155.327000][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 155.332239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 155.350195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 155.356496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 155.375744][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 155.380681][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 155.399724][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 155.404687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 155.419959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 160.336119][ C1] net_ratelimit: 77323 callbacks suppressed [ 160.336133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 160.350811][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 160.354358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 160.369863][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 160.378268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 160.394773][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 160.402200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 160.402353][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 160.419558][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 160.436432][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 165.346126][ C0] net_ratelimit: 75165 callbacks suppressed [ 165.346140][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 165.346835][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 165.352979][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 165.367297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 165.376332][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 165.393185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 165.400298][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 165.417544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 165.424407][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 165.440733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 170.356132][ C1] net_ratelimit: 95720 callbacks suppressed [ 170.356146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 170.361637][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 170.362328][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 170.378983][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 170.386354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 170.401295][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 170.410377][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 170.432756][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 170.434454][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 170.454725][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.366236][ C1] net_ratelimit: 90979 callbacks suppressed [ 175.366283][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 175.366367][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.375490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 175.384510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.400366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 175.408791][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 175.427147][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 175.432846][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.448867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 175.457219][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.376108][ C1] net_ratelimit: 84764 callbacks suppressed [ 180.376122][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 180.377914][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.382250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 180.396828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.406324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 180.424328][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 180.430189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 180.463678][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.466267][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 180.482949][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.386175][ C0] net_ratelimit: 75121 callbacks suppressed [ 185.386202][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.390648][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 185.392451][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.408309][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 185.416289][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.436430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 185.440270][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.455838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 185.464786][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 185.482497][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 190.396279][ C0] net_ratelimit: 77279 callbacks suppressed [ 190.396294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 190.397185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 190.402405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 190.417015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 190.426357][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 190.441202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 190.450545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 190.467631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 190.474745][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 190.490056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 195.406118][ C0] net_ratelimit: 75713 callbacks suppressed [ 195.406138][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.407707][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 195.412291][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.430712][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 195.436231][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.452662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 195.460452][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 195.474901][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 195.485069][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.498094][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 200.416120][ C1] net_ratelimit: 89119 callbacks suppressed [ 200.416135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 200.416383][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 200.422253][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 200.437956][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.446293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 200.467837][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.470183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 200.488323][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.494152][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 200.508082][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.426167][ C0] net_ratelimit: 92488 callbacks suppressed [ 205.426181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.428427][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 205.432435][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.448549][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 205.456663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.470579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 205.480581][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.495069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 205.504459][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.519415][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 210.436123][ C1] net_ratelimit: 91994 callbacks suppressed [ 210.436137][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 210.447372][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 210.454671][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 210.471153][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 210.478597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 210.497215][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.502957][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 210.518042][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 210.526801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 210.542825][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.446152][ C1] net_ratelimit: 84996 callbacks suppressed [ 215.446168][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 215.447967][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.452400][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 215.468581][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.476619][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 215.494543][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.501051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 215.517460][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.525029][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 215.540252][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.456284][ C1] net_ratelimit: 76932 callbacks suppressed [ 220.456328][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 220.456338][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 220.462772][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 220.480195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 220.486613][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.501672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 220.510743][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 220.528322][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 220.534909][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 220.551249][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 225.466142][ C1] net_ratelimit: 81574 callbacks suppressed [ 225.466157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 225.471594][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 225.491153][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.496575][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 225.517239][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.520501][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 225.535867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 225.544633][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 225.561743][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.568568][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 226.648295][ T26] INFO: task kworker/u4:4:428 blocked for more than 123 seconds. [ 226.667701][ T26] Tainted: G W syzkaller #0 [ 226.674094][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 226.947367][ T26] task:kworker/u4:4 state:D stack: 0 pid: 428 ppid: 2 flags:0x00004000 [ 226.977352][ T26] Workqueue: netns cleanup_net [ 226.982187][ T26] Call Trace: [ 226.985506][ T26] __schedule+0xb53/0x1320 [ 227.030566][ T26] ? __sched_text_start+0x8/0x8 [ 227.035484][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 227.086950][ T26] ? __kasan_check_write+0x14/0x20 [ 227.092136][ T26] ? kthread_data+0x50/0xc0 [ 227.119280][ T26] ? wq_worker_sleeping+0x60/0x200 [ 227.124456][ T26] schedule+0x13c/0x1d0 [ 227.405151][ T26] schedule_preempt_disabled+0x13/0x20 [ 227.427360][ T26] __mutex_lock+0x6cc/0xc60 [ 227.431939][ T26] ? pcpu_free_area+0x9c0/0xbe0 [ 227.470162][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 227.484395][ T26] ? free_percpu+0xfd/0xa20 [ 227.507646][ T26] __mutex_lock_slowpath+0xe/0x10 [ 227.512769][ T26] mutex_lock+0xdb/0xf0 [ 227.536198][ T26] ? mutex_trylock+0xa0/0xa0 [ 227.693886][ T26] ? kobject_put+0x1a8/0x270 [ 227.712968][ T26] ? put_device+0x1f/0x30 [ 227.733005][ T26] ? free_netdev+0x384/0x480 [ 227.753114][ T26] rtnl_lock+0x15/0x20 [ 227.776503][ T26] netdev_run_todo+0xb5b/0xd50 [ 227.781336][ T26] ? netdev_refcnt_read+0x1d0/0x1d0 [ 227.816456][ T26] ? unregister_netdevice_queue+0x1aa/0x370 [ 227.941539][ T26] ? list_netdevice+0x4c0/0x4c0 [ 227.963751][ T26] ? remove_wait_queue+0x12e/0x140 [ 227.980647][ T26] rtnl_unlock+0xe/0x10 [ 228.002600][ T26] default_device_exit_batch+0x363/0x3c0 [ 228.019458][ T26] ? default_device_exit+0x390/0x390 [ 228.024799][ T26] ? wait_woken+0x180/0x180 [ 228.056588][ T26] ? rtnl_unlock+0xe/0x10 [ 228.238514][ T26] ? default_device_exit+0x390/0x390 [ 228.243900][ T26] cleanup_net+0x603/0xb80 [ 228.456347][ T26] ? __kasan_check_write+0x14/0x20 [ 228.461563][ T26] ? ops_init+0x4a0/0x4a0 [ 228.465924][ T26] ? read_word_at_a_time+0x12/0x20 [ 228.495699][ T26] ? strscpy+0x9b/0x290 [ 228.507366][ T26] process_one_work+0x6e1/0xba0 [ 228.512275][ T26] worker_thread+0xa6a/0x13c0 [ 228.544965][ T26] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 228.587052][ T26] ? __kasan_check_read+0x11/0x20 [ 228.592253][ T26] kthread+0x346/0x3d0 [ 228.686069][ T26] ? worker_clr_flags+0x190/0x190 [ 228.702243][ T26] ? kthread_blkcg+0xd0/0xd0 [ 228.740472][ T26] ret_from_fork+0x1f/0x30 [ 228.745017][ T26] INFO: task syz.0.767:3085 blocked for more than 125 seconds. [ 228.916480][ T26] Tainted: G W syzkaller #0 [ 228.922876][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 228.958030][ T26] task:syz.0.767 state:D stack: 0 pid: 3085 ppid: 281 flags:0x00004004 [ 228.986848][ T26] Call Trace: [ 228.990220][ T26] __schedule+0xb53/0x1320 [ 228.994661][ T26] ? __sched_text_start+0x8/0x8 [ 229.047631][ T26] ? __mutex_add_waiter+0x180/0x280 [ 229.052897][ T26] ? __kasan_check_write+0x14/0x20 [ 229.087063][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 229.092933][ T26] schedule+0x13c/0x1d0 [ 229.127154][ T26] schedule_preempt_disabled+0x13/0x20 [ 229.132686][ T26] __mutex_lock+0x6cc/0xc60 [ 229.176357][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 229.220178][ T26] ? ops_init+0x89/0x4a0 [ 229.224494][ T26] ? setup_net+0x376/0xb60 [ 229.617400][ T26] ? copy_net_ns+0x314/0x520 [ 229.622066][ T26] ? create_new_namespaces+0x3a2/0x650 [ 229.637229][ T26] ? copy_process+0x11d3/0x3300 [ 229.642131][ T26] ? kernel_clone+0x233/0x960 [ 229.673679][ T26] ? __x64_sys_clone+0x198/0x210 [ 229.700407][ T26] ? do_syscall_64+0x31/0x40 [ 229.705433][ T26] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 229.997155][ T26] __mutex_lock_slowpath+0xe/0x10 [ 230.002245][ T26] mutex_lock+0xdb/0xf0 [ 230.026325][ T26] ? mutex_trylock+0xa0/0xa0 [ 230.031071][ T26] rtnl_lock+0x15/0x20 [ 230.035168][ T26] ip_tunnel_init_net+0x2ad/0x730 [ 230.084525][ T26] ? ip_tunnel_get_iflink+0x50/0x50 [ 230.102644][ T26] ? __kmalloc+0x1a4/0x330 [ 230.122712][ T26] ipgre_init_net+0x24/0x30 [ 230.143566][ T26] ops_init+0x1ba/0x4a0 [ 230.167761][ T26] ? ops_init+0x3df/0x4a0 [ 230.172155][ T26] setup_net+0x376/0xb60 [ 230.317386][ T26] ? copy_net_ns+0x520/0x520 [ 230.322044][ T26] ? __kasan_check_write+0x14/0x20 [ 230.357242][ T26] copy_net_ns+0x314/0x520 [ 230.361742][ T26] create_new_namespaces+0x3a2/0x650 [ 230.390571][ T26] copy_namespaces+0x1d1/0x220 [ 230.395402][ T26] ? copy_signal+0x4cb/0x600 [ 230.476207][ C0] net_ratelimit: 78853 callbacks suppressed [ 230.476222][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.476607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 230.482390][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.498392][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 230.506212][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.520870][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 230.530285][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.545980][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 230.554363][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.568584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 230.792055][ T26] copy_process+0x11d3/0x3300 [ 230.806366][ T26] ? perf_release+0x40/0x40 [ 230.810951][ T26] ? __pidfd_prepare+0x150/0x150 [ 230.815935][ T26] kernel_clone+0x233/0x960 [ 230.876261][ T26] ? create_io_thread+0x170/0x170 [ 230.881446][ T26] ? kvm_sched_clock_read+0x18/0x40 [ 230.976724][ T26] ? sched_clock+0x3a/0x40 [ 230.981241][ T26] ? sched_clock_cpu+0x1b/0x3d0 [ 230.996366][ T26] __x64_sys_clone+0x198/0x210 [ 231.001191][ T26] ? __ia32_sys_vfork+0x130/0x130 [ 231.037291][ T26] do_syscall_64+0x31/0x40 [ 231.041778][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 231.084550][ T26] RIP: 0033:0x7f8e2bcd5dd9 [ 231.112895][ T26] RSP: 002b:00007f8e2a70efd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 231.196775][ T26] RAX: ffffffffffffffda RBX: 00007f8e2bf4f090 RCX: 00007f8e2bcd5dd9 [ 231.204828][ T26] RDX: 0000000000000000 RSI: 0000000000000060 RDI: 0000000040000000 [ 231.299257][ T26] RBP: 00007f8e2bd6bd69 R08: 0000000000000000 R09: 0000000000000000 [ 231.333553][ T26] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 231.368229][ T26] R13: 00007f8e2bf4f128 R14: 00007f8e2bf4f090 R15: 00007ffed4f5aa28 [ 231.391430][ T26] INFO: task syz.3.771:3105 blocked for more than 128 seconds. [ 231.716548][ T26] Tainted: G W syzkaller #0 [ 231.723129][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 231.758017][ T26] task:syz.3.771 state:D stack: 0 pid: 3105 ppid: 283 flags:0x00004004 [ 231.787124][ T26] Call Trace: [ 231.790564][ T26] __schedule+0xb53/0x1320 [ 231.794999][ T26] ? __sched_text_start+0x8/0x8 [ 231.846293][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 231.851478][ T26] ? __kasan_check_write+0x14/0x20 [ 232.247823][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 232.253706][ T26] schedule+0x13c/0x1d0 [ 232.297313][ T26] schedule_preempt_disabled+0x13/0x20 [ 232.302841][ T26] __mutex_lock+0x6cc/0xc60 [ 232.976774][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 232.983619][ T26] ? __asan_set_shadow_00+0xe/0x10 [ 233.018058][ T26] ? do_vfs_ioctl+0x1302/0x14c0 [ 233.022978][ T26] __mutex_lock_slowpath+0xe/0x10 [ 233.046147][ T26] mutex_lock+0xdb/0xf0 [ 233.050373][ T26] ? mutex_trylock+0xa0/0xa0 [ 233.054999][ T26] ? check_stack_object+0x106/0x140 [ 233.333494][ T26] ? __kasan_check_write+0x14/0x20 [ 233.356336][ T26] rtnl_lock+0x15/0x20 [ 233.360470][ T26] __tun_chr_ioctl+0x3eb/0x1d00 [ 233.365347][ T26] ? tun_flow_create+0x320/0x320 [ 233.386863][ T26] ? do_sys_openat2+0x68e/0x750 [ 233.391778][ T26] ? __fget_files+0x2c4/0x320 [ 233.416510][ T26] tun_chr_ioctl+0x2a/0x40 [ 233.421077][ T26] ? tun_chr_poll+0x6b0/0x6b0 [ 233.425772][ T26] __se_sys_ioctl+0x121/0x1a0 [ 233.447870][ T26] __x64_sys_ioctl+0x7b/0x90 [ 233.452566][ T26] do_syscall_64+0x31/0x40 [ 233.648378][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 233.654345][ T26] RIP: 0033:0x7f36d87cbdd9 [ 233.686503][ T26] RSP: 002b:00007f36d7205028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 233.695166][ T26] RAX: ffffffffffffffda RBX: 00007f36d8a45090 RCX: 00007f36d87cbdd9 [ 233.737247][ T26] RDX: 0000200000000040 RSI: 00000000400454ca RDI: 0000000000000004 [ 233.745280][ T26] RBP: 00007f36d8861d69 R08: 0000000000000000 R09: 0000000000000000 [ 233.777043][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 233.785413][ T26] R13: 00007f36d8a45128 R14: 00007f36d8a45090 R15: 00007fffb4e42c78 [ 233.817600][ T26] INFO: task syz.3.771:3106 blocked for more than 130 seconds. [ 233.825222][ T26] Tainted: G W syzkaller #0 [ 233.847581][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 233.978214][ T26] task:syz.3.771 state:D stack: 0 pid: 3106 ppid: 283 flags:0x00004004 [ 233.997668][ T26] Call Trace: [ 234.001012][ T26] __schedule+0xb53/0x1320 [ 234.005452][ T26] ? __sched_text_start+0x8/0x8 [ 234.046463][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 234.051658][ T26] ? __kasan_check_write+0x14/0x20 [ 234.076582][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 234.082449][ T26] schedule+0x13c/0x1d0 [ 234.097406][ T26] schedule_preempt_disabled+0x13/0x20 [ 234.102937][ T26] __mutex_lock+0x6cc/0xc60 [ 234.127487][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 234.134317][ T26] __mutex_lock_slowpath+0xe/0x10 [ 234.156423][ T26] mutex_lock+0xdb/0xf0 [ 234.268232][ T26] ? mutex_trylock+0xa0/0xa0 [ 234.272897][ T26] rtnl_lock+0x15/0x20 [ 234.297422][ T26] dev_ioctl+0x542/0xb80 [ 234.301947][ T26] sock_do_ioctl+0x27b/0x380 [ 234.327319][ T26] ? sock_show_fdinfo+0xa0/0xa0 [ 234.332233][ T26] ? memcpy+0x56/0x70 [ 234.338530][ T26] ? selinux_file_ioctl+0x3a0/0x4d0 [ 234.343776][ T26] ? alloc_file_pseudo+0x1aa/0x200 [ 235.087080][ T26] sock_ioctl+0x4bd/0x760 [ 235.091480][ T26] ? sock_poll+0x350/0x350 [ 235.095938][ T26] ? __fget_files+0x2c4/0x320 [ 235.137006][ T26] ? security_file_ioctl+0x84/0xa0 [ 235.142195][ T26] ? sock_poll+0x350/0x350 [ 235.157073][ T26] __se_sys_ioctl+0x121/0x1a0 [ 235.161809][ T26] __x64_sys_ioctl+0x7b/0x90 [ 235.186445][ T26] do_syscall_64+0x31/0x40 [ 235.190936][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 235.216503][ T26] RIP: 0033:0x7f36d87cbdd9 [ 235.221152][ T26] RSP: 002b:00007f36d71e4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 235.246492][ T26] RAX: ffffffffffffffda RBX: 00007f36d8a45180 RCX: 00007f36d87cbdd9 [ 235.317056][ T26] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 0000000000000006 [ 235.325101][ T26] RBP: 00007f36d8861d69 R08: 0000000000000000 R09: 0000000000000000 [ 235.377491][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 235.385526][ T26] R13: 00007f36d8a45218 R14: 00007f36d8a45180 R15: 00007fffb4e42c78 [ 235.417567][ T26] INFO: task syz.4.769:3101 blocked for more than 132 seconds. [ 235.425168][ T26] Tainted: G W syzkaller #0 [ 235.447553][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 235.486082][ C0] net_ratelimit: 75776 callbacks suppressed [ 235.486096][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.486104][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 235.486281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 235.492301][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.504488][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 235.516508][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.528481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 235.541280][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.552496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 235.564542][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.578509][ T26] task:syz.4.769 state:D stack: 0 pid: 3101 ppid: 280 flags:0x00004002 [ 235.766264][ T26] Call Trace: [ 235.769633][ T26] __schedule+0xb53/0x1320 [ 235.774073][ T26] ? __sched_text_start+0x8/0x8 [ 235.816712][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 235.822002][ T26] ? __kasan_check_write+0x14/0x20 [ 235.837732][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 235.843597][ T26] schedule+0x13c/0x1d0 [ 235.866823][ T26] schedule_preempt_disabled+0x13/0x20 [ 235.872463][ T26] __mutex_lock+0x6cc/0xc60 [ 236.137199][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 236.144118][ T26] ? memset+0x35/0x40 [ 236.177605][ T26] __mutex_lock_slowpath+0xe/0x10 [ 236.182683][ T26] mutex_lock+0xdb/0xf0 [ 236.206892][ T26] ? mutex_trylock+0xa0/0xa0 [ 236.211544][ T26] ? security_file_free+0xc7/0xe0 [ 236.237258][ T26] ? tun_chr_open+0x540/0x540 [ 236.242008][ T26] rtnl_lock+0x15/0x20 [ 236.248338][ T26] tun_chr_close+0x40/0x140 [ 236.252879][ T26] __fput+0x2fb/0x770 [ 236.266673][ T26] ____fput+0x15/0x20 [ 236.270710][ T26] task_work_run+0x127/0x190 [ 236.275455][ T26] do_exit+0xa90/0x2500 [ 236.297349][ T26] ? switch_fpu_return+0x19c/0x330 [ 236.302525][ T26] ? put_task_struct+0x90/0x90 [ 236.326450][ T26] ? fpu__clear_all+0x20/0x20 [ 236.331183][ T26] ? __kasan_check_read+0x11/0x20 [ 236.536264][ T26] __x64_sys_exit+0x40/0x40 [ 236.540840][ T26] do_syscall_64+0x31/0x40 [ 236.545300][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 236.607222][ T26] RIP: 0033:0x7f9f06b0add9 [ 236.611697][ T26] RSP: 002b:00007f9f05543fd8 EFLAGS: 00000246 ORIG_RAX: 000000000000003c [ 236.657665][ T26] RAX: ffffffffffffffda RBX: 00007f9f06d84090 RCX: 00007f9f06b0add9 [ 236.665784][ T26] RDX: 00007f9f055449c8 RSI: 0000000000000000 RDI: 0000000000000000 [ 236.767583][ T26] RBP: 00007f9f06ba0d69 R08: 0000000000000000 R09: 0000000000000000 [ 236.775624][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 236.837159][ T26] R13: 00007f9f06d84128 R14: 00007f9f06d84090 R15: 00007fff89a9d178 [ 236.857868][ T26] INFO: task syz.2.770:3103 blocked for more than 133 seconds. [ 236.865589][ T26] Tainted: G W syzkaller #0 [ 236.903735][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 236.987529][ T26] task:syz.2.770 state:D stack: 0 pid: 3103 ppid: 282 flags:0x00004004 [ 237.010347][ T26] Call Trace: [ 237.013693][ T26] __schedule+0xb53/0x1320 [ 237.126172][ T26] ? __sched_text_start+0x8/0x8 [ 237.131093][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 237.156547][ T26] ? __kasan_check_write+0x14/0x20 [ 237.337621][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 237.343493][ T26] schedule+0x13c/0x1d0 [ 237.358546][ T26] schedule_preempt_disabled+0x13/0x20 [ 237.364061][ T26] __mutex_lock+0x6cc/0xc60 [ 237.386157][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 237.392980][ T26] __mutex_lock_slowpath+0xe/0x10 [ 237.417069][ T26] mutex_lock+0xdb/0xf0 [ 237.421285][ T26] ? mutex_trylock+0xa0/0xa0 [ 237.425895][ T26] ? full_name_hash+0xa0/0xf0 [ 237.447823][ T26] ? dev_get_by_name_rcu+0xc8/0xf0 [ 237.453001][ T26] rtnl_lock+0x15/0x20 [ 237.476334][ T26] dev_ioctl+0x542/0xb80 [ 237.480644][ T26] sock_do_ioctl+0x27b/0x380 [ 237.485253][ T26] ? sock_show_fdinfo+0xa0/0xa0 [ 237.609303][ T26] ? selinux_file_ioctl+0x3a0/0x4d0 [ 237.614650][ T26] ? sched_clock+0x3a/0x40 [ 237.636992][ T26] ? sched_clock_cpu+0x1b/0x3d0 [ 237.641901][ T26] sock_ioctl+0x4bd/0x760 [ 237.666652][ T26] ? sock_poll+0x350/0x350 [ 237.671131][ T26] ? __fget_files+0x2c4/0x320 [ 237.675840][ T26] ? security_file_ioctl+0x84/0xa0 [ 237.707095][ T26] ? sock_poll+0x350/0x350 [ 237.711578][ T26] __se_sys_ioctl+0x121/0x1a0 [ 237.736352][ T26] __x64_sys_ioctl+0x7b/0x90 [ 237.741079][ T26] do_syscall_64+0x31/0x40 [ 237.745520][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 237.766473][ T26] RIP: 0033:0x7f2b64511dd9 [ 237.770934][ T26] RSP: 002b:00007f2b62f6c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 237.916720][ T26] RAX: ffffffffffffffda RBX: 00007f2b6478afa0 RCX: 00007f2b64511dd9 [ 237.924864][ T26] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000c [ 237.956671][ T26] RBP: 00007f2b645a7d69 R08: 0000000000000000 R09: 0000000000000000 [ 237.964704][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 237.996845][ T26] R13: 00007f2b6478b038 R14: 00007f2b6478afa0 R15: 00007ffe1a49fb38 [ 238.016260][ T26] NMI backtrace for cpu 1 [ 238.020659][ T26] CPU: 1 PID: 26 Comm: khungtaskd Tainted: G W syzkaller #0 [ 238.029266][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 238.039334][ T26] Call Trace: [ 238.042653][ T26] __dump_stack+0x21/0x24 [ 238.046999][ T26] dump_stack_lvl+0x1a7/0x208 [ 238.051693][ T26] ? show_regs_print_info+0x18/0x18 [ 238.056907][ T26] ? sched_show_task+0x31c/0x480 [ 238.061869][ T26] ? __rcu_read_unlock+0xa0/0xa0 [ 238.066823][ T26] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 238.072912][ T26] dump_stack+0x15/0x1c [ 238.077086][ T26] nmi_trigger_cpumask_backtrace+0x27f/0x2c0 [ 238.083081][ T26] arch_trigger_cpumask_backtrace+0x10/0x20 [ 238.088988][ T26] watchdog+0xe2d/0xf80 [ 238.093179][ T26] ? hungtask_pm_notify+0x50/0x50 [ 238.098247][ T26] ? __kasan_check_read+0x11/0x20 [ 238.103287][ T26] ? __kthread_parkme+0xb9/0x1c0 [ 238.108241][ T26] kthread+0x346/0x3d0 [ 238.112351][ T26] ? hungtask_pm_notify+0x50/0x50 [ 238.117396][ T26] ? kthread_blkcg+0xd0/0xd0 [ 238.122007][ T26] ret_from_fork+0x1f/0x30 [ 238.128232][ T26] Sending NMI from CPU 1 to CPUs 0: [ 238.134548][ C0] NMI backtrace for cpu 0 [ 238.134556][ C0] CPU: 0 PID: 1659 Comm: kworker/0:46 Tainted: G W syzkaller #0 [ 238.134563][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 238.134568][ C0] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 238.134575][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x2e/0x60 [ 238.134587][ C0] Code: 48 8b 45 08 65 48 8b 0d 20 b6 9d 7e 65 8b 15 25 b6 9d 7e f7 c2 00 01 ff 00 74 11 f7 c2 00 01 00 00 74 35 83 b9 dc 0a 00 00 00 <74> 2c 8b 91 b8 0a 00 00 83 fa 02 75 21 48 8b 91 c0 0a 00 00 48 8b [ 238.134591][ C0] RSP: 0018:ffffc90000006e78 EFLAGS: 00000246 [ 238.134598][ C0] RAX: ffffffff83fe7752 RBX: 0000000000000000 RCX: ffff88811d11a780 [ 238.134603][ C0] RDX: 0000000080000101 RSI: 0000000000000001 RDI: 0000000000000000 [ 238.134607][ C0] RBP: ffffc90000006e78 R08: ffffc90000007220 R09: ffffc90000007230 [ 238.134612][ C0] R10: dffffc0000000000 R11: fffff52000000e66 R12: ffff88810c6900a8 [ 238.134617][ C0] R13: 0000000000000030 R14: 0000000000000003 R15: 0000000000000001 [ 238.134623][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 238.134627][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 238.134631][ C0] CR2: 00007fb6b7c1e000 CR3: 000000011a99b000 CR4: 00000000003506b0 [ 238.134636][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 238.134641][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 238.134643][ C0] Call Trace: [ 238.134645][ C0] [ 238.134648][ C0] rt6_score_route+0x4e2/0x730 [ 238.134651][ C0] find_match+0x162/0xd60 [ 238.134654][ C0] __find_rr_leaf+0x256/0x9e0 [ 238.134657][ C0] ? rt6_remove_exception+0x330/0x330 [ 238.134660][ C0] ? get_stack_info+0x36/0xa0 [ 238.134664][ C0] ? update_stack_state+0x16b/0x480 [ 238.134667][ C0] ? fib6_node_lookup+0x3ef/0x420 [ 238.134670][ C0] fib6_table_lookup+0x314/0xa20 [ 238.134674][ C0] ? fib6_nh_age_exceptions+0x940/0x940 [ 238.134677][ C0] ip6_pol_route+0x152/0x1170 [ 238.134680][ C0] ? fib6_table_lookup+0xa20/0xa20 [ 238.134683][ C0] ? get_rps_cpu+0x840/0x840 [ 238.134687][ C0] ? update_stack_state+0x16b/0x480 [ 238.134690][ C0] ip6_pol_route_input+0x56/0x80 [ 238.134695][ C0] fib6_rule_lookup+0x20a/0x5d0 [ 238.134699][ C0] ? ip6_route_input_lookup+0xd0/0xd0 [ 238.134702][ C0] ? fib6_lookup+0x2c0/0x2c0 [ 238.134705][ C0] ? ip6t_do_table+0x1405/0x15b0 [ 238.134708][ C0] ip6_route_input+0x628/0x840 [ 238.134711][ C0] ? ip6_multipath_l3_keys+0x5d0/0x5d0 [ 238.134714][ C0] ? ip6table_raw_hook+0x6a/0x80 [ 238.134718][ C0] ? ip6table_mangle_net_exit+0x80/0x80 [ 238.134721][ C0] ip6_rcv_finish+0x155/0x360 [ 238.134724][ C0] ipv6_rcv+0xf0/0x230 [ 238.134727][ C0] ? ip6_rcv_finish+0x360/0x360 [ 238.134730][ C0] ? refcount_add+0x80/0x80 [ 238.134733][ C0] ? dev_queue_xmit+0x17/0x20 [ 238.134736][ C0] ? br_dev_queue_push_xmit+0x531/0x6b0 [ 238.134739][ C0] ? memcpy+0x56/0x70 [ 238.134742][ C0] ? ip6_rcv_finish+0x360/0x360 [ 238.134745][ C0] __netif_receive_skb+0xc8/0x280 [ 238.134748][ C0] netif_receive_skb+0x9b/0x3f0 [ 238.134751][ C0] ? netif_receive_skb_core+0x100/0x100 [ 238.134754][ C0] ? __br_forward+0x208/0x2f0 [ 238.134757][ C0] ? br_flood+0x3cc/0x420 [ 238.134760][ C0] br_pass_frame_up+0x164/0x1e0 [ 238.134764][ C0] br_handle_frame_finish+0xd33/0x1120 [ 238.134767][ C0] ? brport_get_ownership+0x80/0x80 [ 238.134770][ C0] ? ____kasan_slab_free+0x130/0x160 [ 238.134773][ C0] ? __kasan_slab_free+0x11/0x20 [ 238.134776][ C0] br_handle_frame+0x407/0x8e0 [ 238.134780][ C0] ? br_get_rx_handler+0x20/0x20 [ 238.134783][ C0] __netif_receive_skb_core+0xed9/0x3080 [ 238.134786][ C0] ? kfree_skb+0xc1/0x2f0 [ 238.134789][ C0] ? set_rps_cpu+0x5d0/0x5d0 [ 238.134792][ C0] ? ipv6_rcv+0xf0/0x230 [ 238.134795][ C0] ? tracing_record_taskinfo+0x7c/0x220 [ 238.134798][ C0] ? ip6_rcv_finish+0x360/0x360 [ 238.134802][ C0] ? refcount_add+0x80/0x80 [ 238.134805][ C0] ? __kasan_check_write+0x14/0x20 [ 238.134808][ C0] __netif_receive_skb+0x72/0x280 [ 238.134811][ C0] ? try_to_wake_up+0x616/0xd70 [ 238.134815][ C0] process_backlog+0x368/0x600 [ 238.134818][ C0] net_rx_action+0x44d/0xe00 [ 238.134821][ C0] ? net_tx_action+0x530/0x530 [ 238.134824][ C0] __do_softirq+0x255/0x563 [ 238.134827][ C0] asm_call_irq_on_stack+0xf/0x20 [ 238.134830][ C0] [ 238.134833][ C0] do_softirq_own_stack+0x60/0x80 [ 238.134836][ C0] do_softirq+0xb0/0xf0 [ 238.134839][ C0] ? __local_bh_enable_ip+0x80/0x80 [ 238.134842][ C0] ? _raw_spin_lock_bh+0x94/0xf0 [ 238.134845][ C0] ? _raw_spin_lock_irq+0xf0/0xf0 [ 238.134849][ C0] ? __asan_set_shadow_00+0xe/0x10 [ 238.134852][ C0] __local_bh_enable_ip+0x70/0x80 [ 238.134855][ C0] _raw_spin_unlock_bh+0x51/0x60 [ 238.134858][ C0] wg_packet_decrypt_worker+0x2cc/0xdb0 [ 238.134861][ C0] ? wg_packet_rx_poll+0x1a50/0x1a50 [ 238.134865][ C0] ? enqueue_task_fair+0xaf6/0x2250 [ 238.134868][ C0] ? sched_group_set_shares+0x490/0x490 [ 238.134872][ C0] ? check_preempt_wakeup+0x4e2/0xb00 [ 238.134875][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 238.134879][ C0] ? tracing_record_taskinfo+0x7c/0x220 [ 238.134882][ C0] ? probe_sched_wakeup+0x64/0x80 [ 238.134885][ C0] ? ttwu_do_wakeup+0x39e/0x3c0 [ 238.134888][ C0] ? ttwu_do_activate+0x1e2/0x2b0 [ 238.134892][ C0] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 238.134895][ C0] ? try_to_wake_up+0x616/0xd70 [ 238.134898][ C0] process_one_work+0x6e1/0xba0 [ 238.134906][ C0] worker_thread+0xa6a/0x13c0 [ 238.134909][ C0] kthread+0x346/0x3d0 [ 238.134912][ C0] ? worker_clr_flags+0x190/0x190 [ 238.134915][ C0] ? kthread_blkcg+0xd0/0xd0 [ 238.134918][ C0] ret_from_fork+0x1f/0x30 [ 240.496114][ C1] net_ratelimit: 67393 callbacks suppressed [ 240.496129][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 240.499094][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.502270][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 240.518217][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 240.526964][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 240.542762][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.550929][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 240.566252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.574826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 240.591896][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.506134][ C0] net_ratelimit: 91800 callbacks suppressed [ 245.506149][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.507124][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 245.512195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 245.529312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 245.536305][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.552297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 245.560362][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.574256][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 245.584514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.601506][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 250.516092][ C0] net_ratelimit: 88952 callbacks suppressed [ 250.516108][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.516208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 250.522418][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 250.534289][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 250.546419][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 250.558312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 250.571035][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.582387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 250.595073][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.606301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 255.526101][ C1] net_ratelimit: 91372 callbacks suppressed [ 255.526117][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 255.540123][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.544495][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 255.561516][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.568408][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 255.582540][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 255.592540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 255.606725][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.616546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 255.633572][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.929218][ T26] INFO: task syz-executor:280 blocked for more than 136 seconds. [ 259.946765][ T26] Tainted: G W syzkaller #0 [ 259.953149][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 260.000642][ T26] task:syz-executor state:D stack: 0 pid: 280 ppid: 1 flags:0x00004006 [ 260.028937][ T26] Call Trace: [ 260.032401][ T26] __schedule+0xb53/0x1320 [ 260.136965][ T26] ? __sched_text_start+0x8/0x8 [ 260.141881][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 260.157116][ T26] ? __kasan_check_write+0x14/0x20 [ 260.162289][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 260.203134][ T26] schedule+0x13c/0x1d0 [ 260.232843][ T26] schedule_preempt_disabled+0x13/0x20 [ 260.248105][ T26] __mutex_lock+0x6cc/0xc60 [ 260.252664][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 260.397180][ T26] ? memset+0x35/0x40 [ 260.401249][ T26] __mutex_lock_slowpath+0xe/0x10 [ 260.408211][ T26] mutex_lock+0xdb/0xf0 [ 260.412405][ T26] ? mutex_trylock+0xa0/0xa0 [ 260.426643][ T26] ? security_file_free+0xc7/0xe0 [ 260.431731][ T26] ? tun_chr_open+0x540/0x540 [ 260.459380][ T26] rtnl_lock+0x15/0x20 [ 260.463528][ T26] tun_chr_close+0x40/0x140 [ 260.495824][ T26] __fput+0x2fb/0x770 [ 260.519054][ T26] ____fput+0x15/0x20 [ 260.523184][ T26] task_work_run+0x127/0x190 [ 260.536081][ C1] net_ratelimit: 89617 callbacks suppressed [ 260.536095][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 260.536362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.542216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 260.554295][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.566210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 260.578253][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 260.590501][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 260.602376][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.614280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 260.626537][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.906692][ T26] do_exit+0xa90/0x2500 [ 260.910924][ T26] ? __kasan_check_read+0x11/0x20 [ 260.915968][ T26] ? put_task_struct+0x90/0x90 [ 260.952566][ T26] ? pipe_read+0xf16/0x1010 [ 260.973408][ T26] ? __kasan_check_write+0x14/0x20 [ 260.993146][ T26] ? _raw_spin_lock_irq+0x95/0xf0 [ 261.018917][ T26] ? _raw_spin_lock_irqsave+0x130/0x130 [ 261.024528][ T26] do_group_exit+0x141/0x310 [ 261.346961][ T26] ? __kasan_check_write+0x14/0x20 [ 261.352145][ T26] get_signal+0xf7d/0x12e0 [ 261.626788][ T26] ? security_file_permission+0x83/0xa0 [ 261.632417][ T26] arch_do_signal_or_restart+0xe2/0x11d0 [ 261.670293][ T26] ? kernel_read+0x70/0x70 [ 261.674822][ T26] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 261.717276][ T26] ? __kasan_check_read+0x11/0x20 [ 261.722454][ T26] ? __fdget_pos+0x1f7/0x380 [ 261.848475][ T26] ? vfs_write+0xdc0/0xdc0 [ 261.853067][ T26] ? ____fput+0x15/0x20 [ 262.027541][ T26] ? task_work_run+0x170/0x190 [ 262.032369][ T26] exit_to_user_mode_loop+0xa2/0xe0 [ 262.057082][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 262.062623][ T26] syscall_exit_to_user_mode+0x1d/0x40 [ 262.086958][ T26] do_syscall_64+0x3d/0x40 [ 262.109076][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 262.115030][ T26] RIP: 0033:0x7f9f06ac5f57 [ 262.146376][ T26] RSP: 002b:00007fff89a9d490 EFLAGS: 00000202 ORIG_RAX: 0000000000000000 [ 262.155106][ T26] RAX: fffffffffffffe00 RBX: 0000555557499500 RCX: 00007f9f06ac5f57 [ 262.396777][ T26] RDX: 0000000000000030 RSI: 00007fff89a9d570 RDI: 00000000000000f9 [ 262.404844][ T26] RBP: 00007fff89a9d51c R08: 0000000000000000 R09: 0000000000000000 [ 262.447449][ T26] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000007c [ 262.455662][ T26] R13: 00005555574ac8e0 R14: 000000000001980f R15: 00007fff89a9d570 [ 262.476706][ T26] INFO: task kworker/u4:4:428 blocked for more than 159 seconds. [ 262.484501][ T26] Tainted: G W syzkaller #0 [ 262.717128][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 262.725870][ T26] task:kworker/u4:4 state:D stack: 0 pid: 428 ppid: 2 flags:0x00004000 [ 262.756225][ T26] Workqueue: netns cleanup_net [ 262.761048][ T26] Call Trace: [ 262.764362][ T26] __schedule+0xb53/0x1320 [ 262.787228][ T26] ? __sched_text_start+0x8/0x8 [ 262.792242][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 262.817626][ T26] ? __kasan_check_write+0x14/0x20 [ 262.822894][ T26] ? kthread_data+0x50/0xc0 [ 262.847124][ T26] ? wq_worker_sleeping+0x60/0x200 [ 262.852300][ T26] schedule+0x13c/0x1d0 [ 262.876458][ T26] schedule_preempt_disabled+0x13/0x20 [ 262.881970][ T26] __mutex_lock+0x6cc/0xc60 [ 262.888578][ T26] ? pcpu_free_area+0x9c0/0xbe0 [ 262.893471][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 262.996878][ T26] ? free_percpu+0xfd/0xa20 [ 263.001460][ T26] __mutex_lock_slowpath+0xe/0x10 [ 263.016251][ T26] mutex_lock+0xdb/0xf0 [ 263.020510][ T26] ? mutex_trylock+0xa0/0xa0 [ 263.025114][ T26] ? kobject_put+0x1a8/0x270 [ 263.046963][ T26] ? put_device+0x1f/0x30 [ 263.051469][ T26] ? free_netdev+0x384/0x480 [ 263.076875][ T26] rtnl_lock+0x15/0x20 [ 263.081006][ T26] netdev_run_todo+0xb5b/0xd50 [ 263.085807][ T26] ? netdev_refcnt_read+0x1d0/0x1d0 [ 263.106959][ T26] ? unregister_netdevice_queue+0x1aa/0x370 [ 263.112915][ T26] ? list_netdevice+0x4c0/0x4c0 [ 263.136897][ T26] ? remove_wait_queue+0x12e/0x140 [ 263.142074][ T26] rtnl_unlock+0xe/0x10 [ 263.156311][ T26] default_device_exit_batch+0x363/0x3c0 [ 263.162052][ T26] ? default_device_exit+0x390/0x390 [ 263.186547][ T26] ? wait_woken+0x180/0x180 [ 263.191117][ T26] ? rtnl_unlock+0xe/0x10 [ 263.195478][ T26] ? default_device_exit+0x390/0x390 [ 263.416915][ T26] cleanup_net+0x603/0xb80 [ 263.421402][ T26] ? __kasan_check_write+0x14/0x20 [ 263.447391][ T26] ? ops_init+0x4a0/0x4a0 [ 263.451797][ T26] ? read_word_at_a_time+0x12/0x20 [ 263.477034][ T26] ? strscpy+0x9b/0x290 [ 263.481377][ T26] process_one_work+0x6e1/0xba0 [ 263.489970][ T26] worker_thread+0xa6a/0x13c0 [ 263.494715][ T26] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 263.516996][ T26] ? __kasan_check_read+0x11/0x20 [ 263.522079][ T26] kthread+0x346/0x3d0 [ 263.536451][ T26] ? worker_clr_flags+0x190/0x190 [ 263.541556][ T26] ? kthread_blkcg+0xd0/0xd0 [ 263.556474][ T26] ret_from_fork+0x1f/0x30 [ 263.561031][ T26] INFO: task syz.1.752:3038 blocked for more than 139 seconds. [ 263.587097][ T26] Tainted: G W syzkaller #0 [ 263.593477][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 263.767116][ T26] task:syz.1.752 state:D stack: 0 pid: 3038 ppid: 279 flags:0x00004006 [ 263.806905][ T26] Call Trace: [ 263.810346][ T26] __schedule+0xb53/0x1320 [ 263.814780][ T26] ? __sched_text_start+0x8/0x8 [ 263.836348][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 263.841531][ T26] ? __kasan_check_write+0x14/0x20 [ 264.116741][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 264.122661][ T26] schedule+0x13c/0x1d0 [ 264.156355][ T26] schedule_preempt_disabled+0x13/0x20 [ 264.161996][ T26] __mutex_lock+0x6cc/0xc60 [ 264.186574][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 264.193408][ T26] ? memset+0x35/0x40 [ 264.217431][ T26] __mutex_lock_slowpath+0xe/0x10 [ 264.222519][ T26] mutex_lock+0xdb/0xf0 [ 264.228875][ T26] ? mutex_trylock+0xa0/0xa0 [ 264.233502][ T26] ? security_file_free+0xc7/0xe0 [ 264.277738][ T26] ? tun_chr_open+0x540/0x540 [ 264.282485][ T26] rtnl_lock+0x15/0x20 [ 264.306368][ T26] tun_chr_close+0x40/0x140 [ 264.310937][ T26] __fput+0x2fb/0x770 [ 264.314946][ T26] ____fput+0x15/0x20 [ 264.321111][ T26] task_work_run+0x127/0x190 [ 264.325849][ T26] do_exit+0xa90/0x2500 [ 264.879280][ T26] ? put_task_struct+0x90/0x90 [ 264.884110][ T26] ? kmem_cache_free+0x100/0x2d0 [ 264.909903][ T26] ? ____kasan_slab_free+0x130/0x160 [ 264.915258][ T26] ? get_signal+0xb98/0x12e0 [ 264.937017][ T26] do_group_exit+0x141/0x310 [ 264.941687][ T26] get_signal+0xf7d/0x12e0 [ 264.956442][ T26] arch_do_signal_or_restart+0xe2/0x11d0 [ 264.962315][ T26] ? force_sig_fault+0xd7/0x130 [ 265.347566][ T26] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 265.353286][ T26] ? __bad_area_nosemaphore+0x420/0x420 [ 265.383960][ T26] ? do_user_addr_fault+0xd75/0xde0 [ 265.406534][ T26] ? __bad_area_nosemaphore+0x2b0/0x420 [ 265.412150][ T26] exit_to_user_mode_loop+0xa2/0xe0 [ 265.421053][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 265.437826][ T26] irqentry_exit_to_user_mode+0x9/0x10 [ 265.443339][ T26] irqentry_exit+0x12/0x60 [ 265.459208][ T26] exc_page_fault+0x67/0xc0 [ 265.463770][ T26] ? asm_exc_page_fault+0x8/0x30 [ 265.546166][ C0] net_ratelimit: 78940 callbacks suppressed [ 265.546218][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.550372][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 265.552295][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.570733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 265.576364][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 265.595499][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 265.600694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.619968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 265.624853][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.646618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 265.663848][ T26] asm_exc_page_fault+0x1e/0x30 [ 265.681341][ T26] RIP: 0033:0x7f3732dc1877 [ 265.685797][ T26] RSP: 002b:00007f3731947120 EFLAGS: 00010202 [ 265.694075][ T26] RAX: 0000000000000000 RBX: 000000000000000b RCX: 00007f3732f0bdd9 [ 265.704145][ T26] RDX: 00007f3731947140 RSI: 00007f3731947270 RDI: 000000000000000b [ 265.714453][ T26] RBP: 00007f3732fa1d69 R08: 0000000000000000 R09: 0000000000000000 [ 265.724706][ T26] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 265.734768][ T26] R13: 00007f3733185038 R14: 00007f3733184fa0 R15: 00007ffe9b13e758 [ 265.744917][ T26] INFO: task syz.0.767:3085 blocked for more than 162 seconds. [ 265.767353][ T26] Tainted: G W syzkaller #0 [ 265.773735][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 265.926294][ T26] task:syz.0.767 state:D stack: 0 pid: 3085 ppid: 281 flags:0x00004004 [ 265.935665][ T26] Call Trace: [ 265.956595][ T26] __schedule+0xb53/0x1320 [ 265.961352][ T26] ? __sched_text_start+0x8/0x8 [ 265.976155][ T26] ? __mutex_add_waiter+0x180/0x280 [ 265.981415][ T26] ? __kasan_check_write+0x14/0x20 [ 266.007420][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 266.013301][ T26] schedule+0x13c/0x1d0 [ 266.217714][ T26] schedule_preempt_disabled+0x13/0x20 [ 266.223243][ T26] __mutex_lock+0x6cc/0xc60 [ 266.236350][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 266.243165][ T26] ? ops_init+0x89/0x4a0 [ 266.267234][ T26] ? setup_net+0x376/0xb60 [ 266.271718][ T26] ? copy_net_ns+0x314/0x520 [ 266.296355][ T26] ? create_new_namespaces+0x3a2/0x650 [ 266.301920][ T26] ? copy_process+0x11d3/0x3300 [ 266.326521][ T26] ? kernel_clone+0x233/0x960 [ 266.331293][ T26] ? __x64_sys_clone+0x198/0x210 [ 266.356309][ T26] ? do_syscall_64+0x31/0x40 [ 266.528216][ T26] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 266.546892][ T26] __mutex_lock_slowpath+0xe/0x10 [ 266.552061][ T26] mutex_lock+0xdb/0xf0 [ 266.577641][ T26] ? mutex_trylock+0xa0/0xa0 [ 266.582361][ T26] rtnl_lock+0x15/0x20 [ 266.588581][ T26] ip_tunnel_init_net+0x2ad/0x730 [ 266.593645][ T26] ? ip_tunnel_get_iflink+0x50/0x50 [ 266.608767][ T26] ? __kmalloc+0x1a4/0x330 [ 266.613253][ T26] ipgre_init_net+0x24/0x30 [ 266.637588][ T26] ops_init+0x1ba/0x4a0 [ 266.641821][ T26] ? ops_init+0x3df/0x4a0 [ 266.657608][ T26] setup_net+0x376/0xb60 [ 266.661915][ T26] ? copy_net_ns+0x520/0x520 [ 266.687055][ T26] ? __kasan_check_write+0x14/0x20 [ 266.692348][ T26] copy_net_ns+0x314/0x520 [ 266.698835][ T26] create_new_namespaces+0x3a2/0x650 [ 266.704295][ T26] copy_namespaces+0x1d1/0x220 [ 266.796259][ T26] ? copy_signal+0x4cb/0x600 [ 266.800927][ T26] copy_process+0x11d3/0x3300 [ 266.805627][ T26] ? perf_release+0x40/0x40 [ 266.826667][ T26] ? __pidfd_prepare+0x150/0x150 [ 266.831685][ T26] kernel_clone+0x233/0x960 [ 266.856380][ T26] ? create_io_thread+0x170/0x170 [ 266.861469][ T26] ? kvm_sched_clock_read+0x18/0x40 [ 267.049624][ T26] ? sched_clock+0x3a/0x40 [ 267.054115][ T26] ? sched_clock_cpu+0x1b/0x3d0 [ 267.076381][ T26] __x64_sys_clone+0x198/0x210 [ 267.081213][ T26] ? __ia32_sys_vfork+0x130/0x130 [ 267.186149][ T26] do_syscall_64+0x31/0x40 [ 267.190637][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 267.216275][ T26] RIP: 0033:0x7f8e2bcd5dd9 [ 267.220754][ T26] RSP: 002b:00007f8e2a70efd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 267.247563][ T26] RAX: ffffffffffffffda RBX: 00007f8e2bf4f090 RCX: 00007f8e2bcd5dd9 [ 267.255589][ T26] RDX: 0000000000000000 RSI: 0000000000000060 RDI: 0000000040000000 [ 267.358161][ T26] RBP: 00007f8e2bd6bd69 R08: 0000000000000000 R09: 0000000000000000 [ 267.386353][ T26] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 267.394392][ T26] R13: 00007f8e2bf4f128 R14: 00007f8e2bf4f090 R15: 00007ffed4f5aa28 [ 267.427641][ T26] NMI backtrace for cpu 1 [ 267.432026][ T26] CPU: 1 PID: 26 Comm: khungtaskd Tainted: G W syzkaller #0 [ 267.440619][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 267.450770][ T26] Call Trace: [ 267.454085][ T26] __dump_stack+0x21/0x24 [ 267.458431][ T26] dump_stack_lvl+0x1a7/0x208 [ 267.463123][ T26] ? show_regs_print_info+0x18/0x18 [ 267.468361][ T26] ? sched_show_task+0x31c/0x480 [ 267.473315][ T26] ? __rcu_read_unlock+0xa0/0xa0 [ 267.478284][ T26] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 267.484367][ T26] dump_stack+0x15/0x1c [ 267.488542][ T26] nmi_trigger_cpumask_backtrace+0x27f/0x2c0 [ 267.494574][ T26] arch_trigger_cpumask_backtrace+0x10/0x20 [ 267.500488][ T26] watchdog+0xe2d/0xf80 [ 267.504663][ T26] ? hungtask_pm_notify+0x50/0x50 [ 267.509704][ T26] ? __kasan_check_read+0x11/0x20 [ 267.514781][ T26] ? __kthread_parkme+0xb9/0x1c0 [ 267.519851][ T26] kthread+0x346/0x3d0 [ 267.523937][ T26] ? hungtask_pm_notify+0x50/0x50 [ 267.529065][ T26] ? kthread_blkcg+0xd0/0xd0 [ 267.533672][ T26] ret_from_fork+0x1f/0x30 [ 267.539987][ T26] Sending NMI from CPU 1 to CPUs 0: [ 267.546610][ C0] NMI backtrace for cpu 0 [ 267.546619][ C0] CPU: 0 PID: 3104 Comm: syz.3.771 Tainted: G W syzkaller #0 [ 267.546627][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 267.546633][ C0] RIP: 0010:do_trace_write_msr+0x54/0x100 [ 267.546648][ C0] Code: c3 65 8b 05 5e 62 a8 7d 41 89 c4 c1 e8 06 48 8d 3c c5 a8 79 c3 86 be 08 00 00 00 e8 86 8c 45 ff 31 f6 4c 0f a3 25 94 ca 69 04 <41> 0f 92 c4 40 0f 92 c6 bf 02 00 00 00 e8 ba 0a 0b ff 45 84 e4 74 [ 267.546654][ C0] RSP: 0018:ffffc900000073a8 EFLAGS: 00000047 [ 267.546665][ C0] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff8259af0a [ 267.546671][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff86c379a8 [ 267.546678][ C0] RBP: ffffc900000073c8 R08: ffffffff86c379af R09: 1ffffffff0d86f35 [ 267.546685][ C0] R10: dffffc0000000000 R11: fffffbfff0d86f36 R12: 0000000000000000 [ 267.546692][ C0] R13: ffff8881f7026e88 R14: 000000000000003e R15: 0000000000000838 [ 267.546699][ C0] FS: 00007f36d72266c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 267.546705][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 267.546712][ C0] CR2: 00007fbc97fab529 CR3: 000000011a99b000 CR4: 00000000003506b0 [ 267.546718][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 267.546725][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 267.546728][ C0] Call Trace: [ 267.546731][ C0] [ 267.546736][ C0] native_apic_msr_write+0x49/0x50 [ 267.546740][ C0] lapic_next_event+0x5f/0x70 [ 267.546745][ C0] clockevents_program_event+0x1fa/0x8b0 [ 267.546750][ C0] tick_program_event+0xa3/0x120 [ 267.546754][ C0] hrtimer_interrupt+0x3f9/0xdc0 [ 267.546759][ C0] __sysvec_apic_timer_interrupt+0xfa/0x3f0 [ 267.546764][ C0] sysvec_apic_timer_interrupt+0xba/0xe0 [ 267.546770][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 267.546774][ C0] RIP: 0010:__wake_up+0x0/0x180 [ 267.546790][ C0] Code: f7 e8 f4 43 55 00 48 83 c3 22 49 89 1e 4c 89 ff 4c 89 ee e8 72 e2 38 03 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 00 <55> 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec c0 00 [ 267.546795][ C0] RSP: 0018:ffffc90000007700 EFLAGS: 00000246 [ 267.546804][ C0] RAX: ffffffff83bd19c3 RBX: 0000000000000000 RCX: 0000000000000000 [ 267.546811][ C0] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffffff86afada0 [ 267.546818][ C0] RBP: ffffc900000077d8 R08: 0000000000000003 R09: 0000000000000004 [ 267.546825][ C0] R10: dffffc0000000000 R11: fffffbfff0de64b0 R12: dffffc0000000001 [ 267.546831][ C0] R13: 0000000000000000 R14: ffffffff86acac01 R15: ffff88812fd4fd01 [ 267.546837][ C0] ? netlink_broadcast_filtered+0x11b3/0x1270 [ 267.546842][ C0] ? netlink_broadcast_filtered+0x11cb/0x1270 [ 267.546846][ C0] ? fdb_fill_info+0x7ab/0xc50 [ 267.546850][ C0] nlmsg_notify+0xed/0x1b0 [ 267.546854][ C0] rtnl_notify+0x9a/0xc0 [ 267.546858][ C0] fdb_notify+0xce/0x130 [ 267.546862][ C0] br_fdb_update+0x45f/0x590 [ 267.546867][ C0] ? hrtimer_interrupt+0x5c2/0xdc0 [ 267.546871][ C0] ? br_fdb_insert+0x60/0x60 [ 267.546875][ C0] ? sched_clock_cpu+0x1b/0x3d0 [ 267.546880][ C0] br_handle_frame_finish+0x1f4/0x1120 [ 267.546885][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 267.546890][ C0] ? brport_get_ownership+0x80/0x80 [ 267.546895][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 267.546899][ C0] br_handle_frame+0x407/0x8e0 [ 267.546904][ C0] ? br_get_rx_handler+0x20/0x20 [ 267.546909][ C0] __netif_receive_skb_core+0xed9/0x3080 [ 267.546913][ C0] ? sched_clock+0x3a/0x40 [ 267.546917][ C0] ? set_rps_cpu+0x5d0/0x5d0 [ 267.546922][ C0] ? debug_smp_processor_id+0x17/0x20 [ 267.546926][ C0] ? __irq_exit_rcu+0x40/0x150 [ 267.546930][ C0] ? irq_exit_rcu+0x9/0x10 [ 267.546935][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 267.546940][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 267.546945][ C0] __netif_receive_skb+0x72/0x280 [ 267.546949][ C0] ? __do_softirq+0x255/0x563 [ 267.546954][ C0] process_backlog+0x368/0x600 [ 267.546958][ C0] net_rx_action+0x44d/0xe00 [ 267.546962][ C0] ? net_tx_action+0x530/0x530 [ 267.546966][ C0] __do_softirq+0x255/0x563 [ 267.546971][ C0] asm_call_irq_on_stack+0xf/0x20 [ 267.546974][ C0] [ 267.546978][ C0] do_softirq_own_stack+0x60/0x80 [ 267.546982][ C0] __irq_exit_rcu+0x128/0x150 [ 267.546986][ C0] irq_exit_rcu+0x9/0x10 [ 267.546991][ C0] sysvec_apic_timer_interrupt+0xbf/0xe0 [ 267.546996][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 267.547001][ C0] RIP: 0010:__slab_free+0xc1/0x3a0 [ 267.547016][ C0] Code: 7e 20 4d 39 f8 0f 84 76 02 00 00 8b 47 28 4a 8d 0c 00 48 0f c9 4c 8b 6e 28 48 8b 97 d8 00 00 00 4c 31 fa 48 31 ca 4a 89 14 00 <44> 89 e8 2b 45 b4 0f b7 c0 45 89 ee 41 81 e6 00 00 ff ff 41 09 c6 [ 267.547022][ C0] RSP: 0018:ffffc9000141f118 EFLAGS: 00000282 [ 267.547031][ C0] RAX: 0000000000000078 RBX: ffff88811553d8c0 RCX: 38d953158188ffff [ 267.547038][ C0] RDX: d3ac2dec7fa616c2 RSI: ffffea0004554f40 RDI: ffff888107d93b00 [ 267.547045][ C0] RBP: ffffc9000141f198 R08: ffff88811553d8c0 R09: 0000000000000000 [ 267.547051][ C0] R10: dffffc0000000000 R11: fffff52000283e34 R12: ffffea0004554f40 [ 267.547058][ C0] R13: 00000000000c000c R14: ffffffff819f495e R15: 0000000000000000 [ 267.547068][ C0] ? qlink_free+0x3e/0x90 [ 267.547073][ C0] ? irq_exit_rcu+0x9/0x10 [ 267.547078][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 267.547082][ C0] ? qlink_free+0x3e/0x90 [ 267.547086][ C0] ___cache_free+0x10e/0x130 [ 267.547090][ C0] qlink_free+0x50/0x90 [ 267.547095][ C0] qlist_free_all+0x5f/0xb0 [ 267.547099][ C0] kasan_quarantine_reduce+0x14a/0x160 [ 267.547103][ C0] __kasan_slab_alloc+0x2f/0xf0 [ 267.547108][ C0] ? ctx_sched_in+0x259/0x2f0 [ 267.547112][ C0] ? _raw_spin_unlock+0x4d/0x70 [ 267.547117][ C0] ? perf_event_context_sched_in+0x4a7/0x5a0 [ 267.547122][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 267.547127][ C0] ? __perf_event_task_sched_in+0x213/0x290 [ 267.547132][ C0] ? perf_pmu_sched_task+0x180/0x180 [ 267.547137][ C0] ? __kasan_check_write+0x14/0x20 [ 267.547140][ C0] ? mutex_lock+0x92/0xf0 [ 267.547145][ C0] ? mutex_trylock+0xa0/0xa0 [ 267.547149][ C0] slab_post_alloc_hook+0x5d/0x2f0 [ 267.547154][ C0] ? __kernfs_new_node+0xe3/0x6b0 [ 267.547159][ C0] ? __kernfs_new_node+0xe3/0x6b0 [ 267.547163][ C0] kmem_cache_alloc+0x162/0x2d0 [ 267.547167][ C0] ? __kernfs_new_node+0xe3/0x6b0 [ 267.547172][ C0] __kernfs_new_node+0xe3/0x6b0 [ 267.547176][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 267.547180][ C0] ? sched_clock_cpu+0x1b/0x3d0 [ 267.547185][ C0] ? kernfs_new_node+0x260/0x260 [ 267.547189][ C0] ? __irq_exit_rcu+0x40/0x150 [ 267.547193][ C0] ? irq_exit_rcu+0x9/0x10 [ 267.547198][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 267.547202][ C0] kernfs_new_node+0x150/0x260 [ 267.547207][ C0] __kernfs_create_file+0x4e/0x270 [ 267.547211][ C0] sysfs_add_file_mode_ns+0x29a/0x350 [ 267.547216][ C0] internal_create_group+0x495/0xd00 [ 267.547220][ C0] ? irq_exit_rcu+0x9/0x10 [ 267.547225][ C0] ? sysfs_create_group+0x30/0x30 [ 267.547230][ C0] sysfs_create_groups+0x58/0x120 [ 267.547234][ C0] kobject_add_internal+0x825/0xcc0 [ 267.547239][ C0] kobject_init_and_add+0x128/0x190 [ 267.547243][ C0] ? irq_exit_rcu+0x9/0x10 [ 267.547248][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 267.547253][ C0] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 267.547258][ C0] ? kobject_add+0x230/0x230 [ 267.547263][ C0] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 267.547268][ C0] netdev_queue_update_kobjects+0x16c/0x390 [ 267.547273][ C0] netdev_register_kobject+0x2af/0x360 [ 267.547278][ C0] register_netdevice+0xdf0/0x13e0 [ 267.547283][ C0] ? netif_stacked_transfer_operstate+0x220/0x220 [ 267.547288][ C0] ? get_random_bytes+0x1c/0x30 [ 267.547292][ C0] tun_set_iff+0x812/0xe00 [ 267.547296][ C0] __tun_chr_ioctl+0x82a/0x1d00 [ 267.547301][ C0] ? tun_flow_create+0x320/0x320 [ 267.547305][ C0] ? __fget_files+0x2c4/0x320 [ 267.547309][ C0] tun_chr_ioctl+0x2a/0x40 [ 267.547313][ C0] ? tun_chr_poll+0x6b0/0x6b0 [ 267.547317][ C0] __se_sys_ioctl+0x121/0x1a0 [ 267.547321][ C0] __x64_sys_ioctl+0x7b/0x90 [ 267.547326][ C0] do_syscall_64+0x31/0x40 [ 267.547331][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 267.547335][ C0] RIP: 0033:0x7f36d87cbdd9 [ 267.547350][ C0] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 267.547356][ C0] RSP: 002b:00007f36d7226028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.547367][ C0] RAX: ffffffffffffffda RBX: 00007f36d8a44fa0 RCX: 00007f36d87cbdd9 [ 267.547374][ C0] RDX: 0000200000000200 RSI: 00000000400454ca RDI: 0000000000000004 [ 267.547381][ C0] RBP: 00007f36d8861d69 R08: 0000000000000000 R09: 0000000000000000 [ 267.547387][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 267.547394][ C0] R13: 00007f36d8a45038 R14: 00007f36d8a44fa0 R15: 00007fffb4e42c78 [ 270.556069][ C1] net_ratelimit: 74256 callbacks suppressed [ 270.556085][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 270.556249][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.562196][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 270.574301][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.586231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 270.598143][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 270.610192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 270.622163][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.634071][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 270.646169][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.566107][ C1] net_ratelimit: 91257 callbacks suppressed [ 275.566123][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 275.566692][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.572284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 275.588473][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 275.596610][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 275.611406][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 275.620852][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 275.653637][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.656788][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 275.679844][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.576212][ C0] net_ratelimit: 86054 callbacks suppressed [ 280.576228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.578153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 280.582561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.597380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 280.606705][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.623648][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 280.630710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.646171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 280.654720][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.670659][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 285.586140][ C0] net_ratelimit: 89356 callbacks suppressed [ 285.586156][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.586952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 285.592573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.611700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 285.616618][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 285.633628][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 285.640789][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.658522][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 285.665150][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.680307][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 290.596088][ C0] net_ratelimit: 79472 callbacks suppressed [ 290.596102][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.597791][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 290.602202][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.619942][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 290.626492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 290.642634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 290.650440][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 290.667681][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 290.676658][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.690176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 295.606138][ C1] net_ratelimit: 69486 callbacks suppressed [ 295.606168][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 295.606244][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.616210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 295.624360][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.642304][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 295.648428][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 295.662608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 295.672517][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.688829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 295.696672][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.616079][ C0] net_ratelimit: 75885 callbacks suppressed [ 300.616093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.618853][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 300.622512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.639624][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 300.646408][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.660533][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 300.670337][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.684846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 300.694408][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 300.708629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 305.626221][ C1] net_ratelimit: 83141 callbacks suppressed [ 305.626284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 305.637720][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.648796][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 305.656680][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.671289][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 305.680568][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 305.696178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 305.704547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.721591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 305.728475][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.636115][ C1] net_ratelimit: 84283 callbacks suppressed [ 310.636130][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 310.639819][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.642333][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 310.659752][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.666366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 310.682208][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.690336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 310.705989][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.714452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 310.733231][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 315.646098][ C0] net_ratelimit: 88716 callbacks suppressed [ 315.646112][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.648497][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 315.652521][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.675471][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 315.676530][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.695225][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 315.700667][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.717092][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 315.725113][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 315.745012][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 320.656267][ C1] net_ratelimit: 83256 callbacks suppressed [ 320.656315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 320.656353][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 320.667950][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 320.675103][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 320.697676][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 320.698721][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 320.716438][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 320.722642][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 320.738950][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 320.746847][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.666116][ C1] net_ratelimit: 70049 callbacks suppressed [ 325.666150][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 325.666302][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.676275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 325.684383][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.699985][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 325.708632][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.723395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 325.732432][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.749154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 325.756321][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 330.676068][ C0] net_ratelimit: 74497 callbacks suppressed [ 330.676083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.676814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 330.682368][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.702022][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 330.706861][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.718571][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 330.730640][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.742524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 330.754571][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 330.766645][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 335.686055][ C1] net_ratelimit: 85863 callbacks suppressed [ 335.686074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 335.686090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.689615][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 335.692307][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 335.708559][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 335.716809][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 335.733540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 335.741904][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.763961][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 335.765602][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.696048][ C1] net_ratelimit: 87424 callbacks suppressed [ 340.696064][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 340.710652][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.714312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 340.730070][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.738143][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 340.756119][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.762183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 340.777815][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.786268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 340.801668][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 345.706076][ C1] net_ratelimit: 87480 callbacks suppressed [ 345.706091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 345.724136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 345.724474][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.736423][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 345.752877][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.760225][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 345.779058][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.784288][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 345.802800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.808337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 350.716089][ C1] net_ratelimit: 77020 callbacks suppressed [ 350.716120][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 350.716417][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.727627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 350.734583][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.750242][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 350.758655][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.776544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 350.782772][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.802583][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 350.807111][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.726038][ C0] net_ratelimit: 78266 callbacks suppressed [ 355.726052][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.727005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 355.732187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.756464][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 355.768157][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.786092][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 355.793101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.807727][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 355.816320][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.831633][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 360.736037][ C1] net_ratelimit: 90024 callbacks suppressed [ 360.736050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 360.736059][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.736364][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.742420][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 360.754849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.766336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 360.778692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.790650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 360.802433][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.814738][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 365.746083][ C0] net_ratelimit: 82082 callbacks suppressed [ 365.746098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.749148][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 365.752280][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.768553][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 365.776220][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.790044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 365.800294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.816725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 365.824245][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.842206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 370.756107][ C0] net_ratelimit: 86957 callbacks suppressed [ 370.756121][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.758802][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 370.762371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.779742][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 370.786266][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 370.801193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 370.810622][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.827241][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 370.834754][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.853728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 375.766098][ C1] net_ratelimit: 90715 callbacks suppressed [ 375.766112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 375.771349][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.772350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 375.791670][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.796358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 375.813648][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 375.820744][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 375.835428][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.844789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 375.860545][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.776051][ C0] net_ratelimit: 93163 callbacks suppressed [ 380.776065][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.776182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 380.782144][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.796898][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 380.806876][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.827955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 380.830693][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.846306][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 380.855331][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.868699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 385.786064][ C1] net_ratelimit: 94052 callbacks suppressed [ 385.786079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 385.786889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.792172][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 385.820595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.828175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 385.844892][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.852228][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 385.872842][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.876390][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 385.890796][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.796045][ C0] net_ratelimit: 93182 callbacks suppressed [ 390.796059][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.797380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 390.802122][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 390.820747][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 390.826262][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.843140][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 390.856191][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.865423][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 390.874147][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.890025][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 395.806032][ C0] net_ratelimit: 95916 callbacks suppressed [ 395.806046][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.811642][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 395.812347][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.826660][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 395.836136][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 395.856922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 395.860335][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.876730][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0) [ 395.884252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.900692][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:b5:2b:1c:33:ad, vlan:0)