last executing test programs: 4m58.583584807s ago: executing program 1 (id=1212): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001000)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000700)=@raw=[@ringbuf_query, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000800)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0xc, 0x7f, 0x17}, 0x10, 0x2b8c5, 0xffffffffffffffff, 0x1, &(0x7f0000000f80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000fc0)=[{0x5, 0x5, 0x6, 0x2}], 0x10, 0xfff}, 0x94) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x6, &(0x7f0000000040)=r1, 0x4) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x13, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000040), 0x4) (async) sendmsg$tipc(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00c014}, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) recvmsg(r5, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) (async) sendmsg$tipc(r5, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r4}, 0xc) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r9, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x5b, &(0x7f00000014c0)=[{}], 0x8, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x75, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) (async) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f00000028c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000038c0)={0x30, 0x10, &(0x7f0000001100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@jmp={0x5, 0x1, 0xb, 0x1, 0x5, 0xffffffffffffffc0}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x8, 0x89, &(0x7f00000011c0)=""/137, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000013c0)={0x0, 0x4, 0x1ff, 0x4}, 0x10, r10, 0xffffffffffffffff, 0x0, &(0x7f0000001780)=[r3, r3, r3, r11, r3], 0x0, 0x10, 0x6}, 0x94) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYRES8=r1], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r10}, 0x94) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000100000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000bc2f1f78d6562716fc44e098ef861b7d484772fc7aaa7846566ce2cfca7fc5e8dbfbf43f1f3c1925170d4428fb1978c57c98662b24f73b8eb53877ad5a35690dd1e751689ae3d67de4f0e8048d130759a5f9d2be4ec5240afede89396843953b"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x81, r13}, 0x38) (async) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r14}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r12, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x1000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 4m55.76498658s ago: executing program 3 (id=1219): bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffd9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000008000000000000000000e9ef413c1a2297fa08a2dbbca7f4a8511a388c0a39f25b69a5d58782042411006611fddfeceb7c8e9d202d8e6863d970b60461a3c1bd5099c7863417a92360da7e9acf80002f91cc958b72da060615993f62b018ff338ca0a567c0e225e9f3bdca0093ed78c77b8fffc757788cc6011ad8437d03237463401e0306ed"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r6}, 0xc) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xa}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 4m55.635783203s ago: executing program 3 (id=1221): perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3f, 0x2000000000000033, &(0x7f0000000440)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000646c6c2500000000002008207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000a35000008500000006000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="09000000180000000800000040"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000340), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r4}, &(0x7f00000008c0), &(0x7f0000000900)=r3}, 0x20) gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x3}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) 4m55.420638924s ago: executing program 1 (id=1228): ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16004, 0x0, 0x81, 0x5, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000c1000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000004440)={&(0x7f0000000ec0)=@name={0x1e, 0x2, 0x4, {{0x43, 0x2}, 0x4}}, 0x10, 0x0}, 0x0) (async) sendmsg$tipc(r6, &(0x7f0000004440)={&(0x7f0000000ec0)=@name={0x1e, 0x2, 0x4, {{0x43, 0x2}, 0x4}}, 0x10, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) 4m55.143121012s ago: executing program 3 (id=1233): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1000007, 0x90180, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xb, 0xa}, 0x100020, 0x2290f, 0xfff, 0x5, 0x200, 0x10000, 0x400, 0x0, 0x20}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, 0x0, 0xfdef) (async, rerun: 32) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x2d, 'io'}, {0x2d, 'net_prio'}]}, 0xe) (rerun: 32) 4m54.733755393s ago: executing program 4 (id=1237): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r1 = ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000700000000000000000e95"], &(0x7f0000000440)='GPL\x00'}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='9p_client_req\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) setsockopt$sock_attach_bpf(r3, 0x1, 0x42, &(0x7f0000000040)=r6, 0x3b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r10}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="abf30000000001c9000000000000000085000000560000009500000000000000"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r13, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xf2, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@bloom_filter={0x1e, 0x1000, 0x6, 0xfffffff2, 0x20002, r1, 0x7, '\x00', r14, r6, 0x2, 0x3, 0x2, 0x2}, 0x50) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xffdd) 4m54.613712655s ago: executing program 1 (id=1239): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000780), 0x6, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400080, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r7}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={0x0}, 0x0, 0x10003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305829, &(0x7f0000000040)) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4m54.507581065s ago: executing program 2 (id=1240): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) close(r1) 4m54.405356236s ago: executing program 0 (id=1241): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd"], 0xfdef) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={&(0x7f0000001280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@ptr={0x2, 0x0, 0x0, 0x2, 0x5}, @restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @fwd={0x2}]}, {0x0, [0x5f, 0x61, 0x0]}}, &(0x7f0000001300)=""/91, 0x41, 0x5b, 0x1, 0x0, 0x10000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={0xffffffffffffffff, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x5b, &(0x7f00000014c0)=[{}], 0x8, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x75, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000038c0)={0x30, 0x10, &(0x7f0000001100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@jmp={0x5, 0x1, 0xb, 0x1, 0x5, 0xffffffffffffffc0}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001000)='syzkaller\x00', 0x8, 0x89, &(0x7f00000011c0)=""/137, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x25, r6, 0x8, &(0x7f0000001380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000013c0)={0x0, 0x4, 0x1ff, 0x4}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000001780), 0x0, 0x10, 0x6}, 0x94) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={&(0x7f0000001280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@ptr={0x2, 0x0, 0x0, 0x2, 0x5}, @restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @fwd={0x2}]}, {0x0, [0x5f, 0x61, 0x0]}}, &(0x7f0000001300)=""/91, 0x41, 0x5b, 0x1, 0x0, 0x10000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r9, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x5b, &(0x7f00000014c0)=[{}], 0x8, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x75, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000038c0)={0x30, 0x10, &(0x7f0000001100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@jmp={0x5, 0x0, 0x8, 0xa, 0x3, 0x40, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001000)='syzkaller\x00', 0x8, 0x89, &(0x7f00000011c0)=""/137, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x25, r10, 0x8, &(0x7f0000001380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000013c0)={0x0, 0x4, 0x1ff, 0x4}, 0x10, r11, 0xffffffffffffffff, 0x0, &(0x7f0000001780), 0x0, 0x10, 0x6}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r12}, 0x10) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x4, 0x26, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x80}, [@map_fd={0x18, 0x2, 0x1, 0x0, r0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x98}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffc}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xa}, @map_val={0x18, 0xb, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0xf7, &(0x7f00000004c0)=""/247, 0x40f00, 0x10, '\x00', 0x0, @fallback=0xe, r6, 0x8, &(0x7f00000001c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x7, 0x80000000, 0x9c}, 0x10, r11, r12, 0x8, &(0x7f0000000640)=[r0, r13], &(0x7f0000000680)=[{0x3, 0x4, 0x7, 0x7}, {0x2, 0x1, 0xd}, {0x5, 0x2, 0xa, 0x2}, {0x4, 0x5, 0x2, 0xc}, {0x2, 0x4, 0x2, 0x1}, {0x0, 0x1, 0x10, 0xc}, {0x0, 0x2, 0x9, 0x2}, {0x4, 0x1, 0x4, 0x5}], 0x10, 0xfffff001}, 0x94) 4m54.404642796s ago: executing program 4 (id=1242): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000600)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0b00000007000000080000000800000005c88feac9684e6a813ad9d4851df3dcbcb1beb5207f8517c508658ef3e20de33f90676d542e8edd6a47dd0006c16baa3d65c5d1170db8582643f50d01f60b0c623a88946b0d1432efc59dd170c588e455eb6b39cb2372eafd4eeb7eca8ab603ac233fa6fd753f9f995c75c1e79c121c956ea2fdb08a4f459d81c8c26f2330d8ff85e65a881da1", @ANYRESHEX=r5, @ANYRESHEX=r4], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x20000, 0x0) ioctl$TUNGETSNDBUF(r9, 0x800454d3, &(0x7f00000003c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x3, {0x4e20, 0x1}}, 0x10, 0x0}, 0x0) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r13}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000880)='9p_client_res\x00', r13, 0x0, 0x7}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r10, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)="25af649bc6ba361cdc893c6b0e139a298578f14e2c590b287cde66ef127260283098838b912a27812c72a1cf8c5f7a3fb88e0841130263af629aeefe61a793fccb16f19cad1d79481a30b5c01347bbef883572f77f06baeaf0b18032e66821a9c98fb3ba89579fcda6097cb0ef4a581ea7bbca4f8c68f3cf13f3733409cd26fc193f39780acdc9bbc116afd66eacf29297748aa7fcf7f354d0", 0x99}, {&(0x7f0000000fc0)="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", 0x1000}, {&(0x7f0000000680)="06045206e66b400ffb15738dc17693ff93c0993aae4c36dfb49db62448ca38f02e51fdc3669800a9a67fd11697803cafa9c557fe9886e19bd334ab9a3a43f23c65ee38d4beb3329546c7438cff4453e95f8c89ac0a9604bbf31ec5665841d8b11a66be680234b1b08190fe84b913d9dafc693012a8db35c70d5927264a8fa61e5d2d274701b48dd35df17dcc57c32d1038594b1be542b186081f21384f185f7b7c610dbead1838ac2082a9333d9bf1cf0286c5c79a408b68b8a05042b8350be707792dd59b1655cf0fd41e06c08230a54f5841099c9847524ae3b8d68821509f74dd4bf7b96fde2f486e4f80e1bc61", 0xef}], 0x3, &(0x7f0000000800)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r14, @broadcast, @loopback}}}], 0x20}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89f1, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 4m54.348458251s ago: executing program 0 (id=1243): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="020000000400000005000000aa"], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000200), 0xa7c, r0}, 0x38) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="0103"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x3b, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000110880febb0007aafe8000000000000027bfa7b09303960e2b80"], 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r0, @ANYBLOB="f70300"/20, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB='\x00'/16], 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r3, @ANYRES32, @ANYRES16=r1, @ANYBLOB="9233c313ddfa15ccc4da40d7479af96b5ae8cd159654152a9445eb72390ac6469c6456bcb75fd3ad74fd1ccb3414498773772378160a94cd1d3c49ae3909391ae541e6819387c9234b870b543468265d5f83716fcbe3fe9bd88f1a9be1c6e26b8c08456c4f96e57ff1e15f9699be2b8548e82a348bc504c6246392e439156e5e4688af9c7f8d43201161b097b414963223067a9f2d2f7ee65af8", @ANYRES32, @ANYBLOB="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"/278], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, 0x0, &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000d000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2b) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x18) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) 4m54.278250979s ago: executing program 4 (id=1244): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f37538e486dd6317ce623900fe800000002000e0865a6596aff57b00000000000000000000000000ac"], 0xfe1b) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x3, 0x1, 0x0, 0xf, 0x4000000, [{0x7}]}, @struct={0xc}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x3c, 0x0, 0x1}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedbf790700117df37538e486dd6317ce22800000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2", @ANYRES8=r0], 0xfdef) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x4}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r4, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000400)=[0x0], 0x0, 0x0, 0x1e, &(0x7f0000000500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x6f, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000009038a2dff07edfbf55d118eb99648cb595675554159644befb02230bccfae15674c64799b3cb3c97410e53d24b6ca90a4ac629ef47a7eee8721172a9747a01051e4f6866c6fd021a867e2d0540fd4a7b5cbbb0f804f1bea47ff602fa6db1ad78f5126258656b288ba15dceb0ff9aa387cb57c3bf945adb02e16247d8064d2563810bf0d2a6b01f0d24a9aacf8e0be4dc1c76f970eb58f0159f7bea2e81e1c639e0dcce88f17547e44cb3173f5247e3271a8179bea5d044577719b6db7d89c1ec7ec66f2614083cd35c62966ff4dfeb52965910aeddc684be763b26a87afa3e90fcc8cc2c4ae41fd884828f17af3c1b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r10}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r10, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r9}, &(0x7f00000002c0), &(0x7f0000000340)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4m54.201551436s ago: executing program 2 (id=1245): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES64=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000340)='fdb_delete\x00', r4}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, 0x0, 0x0) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)}, 0x40fd) close(r7) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) 4m54.197633726s ago: executing program 3 (id=1246): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400"], 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r1) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x98, 0x0, 0x0, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x93, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) (async) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x6}]}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000340)='tlb_flush\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 4m54.151217701s ago: executing program 3 (id=1247): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x10, 0x3, 0x12, &(0x7f0000000040)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0xd000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r7) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110c230041) close(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) close(r9) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 4m54.117740295s ago: executing program 0 (id=1248): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x11, 0x316, 0xffffffff, 0x8d4e, 0x28304, 0x1, 0x5cc69c9d, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x50) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0xe7, 0xba, 0x3, 0x3, 0x0, 0x1ed, 0x4004, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x17, 0x4, @perf_config_ext={0x9, 0x7}, 0xc, 0x7, 0x1000, 0x6, 0x200, 0x81, 0x3, 0x0, 0x6, 0x0, 0x7fffffffffffffff}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000000)='./file0\x00', r0, 0x4000, r1}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)=""/200, 0xc8}, {&(0x7f0000000300)=""/15, 0xf}, {&(0x7f0000000340)=""/138, 0x8a}], 0x3, &(0x7f0000000440)=""/49, 0x31}, 0x2040) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0xe, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xfffff427}, [@printk={@lx}, @exit, @alu={0x7, 0x0, 0x2, 0x3, 0x8, 0x40, 0x1}, @alu={0x4, 0x0, 0xb, 0x2, 0x1, 0x2}]}, &(0x7f0000000540)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000015c0)={0x1, 0x1, 0xff, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001600)=[0x1], &(0x7f0000001640)=[{0x0, 0x5, 0x3, 0x7}, {0x4, 0x3, 0x9, 0x2}, {0x0, 0x1, 0xc, 0x7}, {0x2, 0x2, 0x10, 0xb}, {0x0, 0x5, 0x2, 0x6}, {0x3, 0x2, 0xd, 0x5}], 0x10, 0xffff}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001880)={@fallback=r0, 0x33, 0x0, 0x1000, &(0x7f0000001780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f00000017c0)=[0x0, 0x0, 0x0], &(0x7f0000001800)=[0x0], &(0x7f0000001840)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000018c0)={@map=r0, r3, 0x33, 0x8, 0x0, @void, @value, @void, @void, r5}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000001900)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001940)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001b00)={r0, 0x58, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001c00)={&(0x7f0000001b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@func={0xa, 0x0, 0x0, 0xc, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4}}, @type_tag={0x6, 0x0, 0x0, 0x12, 0x1}, @func={0x9, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000001bc0)=""/10, 0x5a, 0xa, 0x1, 0x6}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x18, &(0x7f0000001980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xdbd0}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x1, 0x3, 0x0, 0x3, 0x0, 0x4, 0x1}, @jmp={0x5, 0x0, 0x8, 0x7, 0xb, 0x100, 0x4}, @map_fd={0x18, 0x6, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0xb, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x3}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a40)='syzkaller\x00', 0x3844, 0x0, 0x0, 0x40f00, 0x2, '\x00', r7, 0x0, r8, 0x8, &(0x7f0000001c40)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000001c80)={0x3, 0x7, 0x800, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001cc0)=[r0, r0, r4, r4], &(0x7f0000001d00)=[{0x2, 0x2, 0x4, 0xb}], 0x10, 0x1b}, 0x94) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)=@generic={&(0x7f0000001e00)='./file0\x00', 0x0, 0x10}, 0x18) openat$cgroup_type(r4, &(0x7f0000001e80), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001f00)={&(0x7f0000001ec0)='rpm_return_int\x00', r4, 0x0, 0x40}, 0x18) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000002140)={0x80, 0x0}, 0x8) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x1, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002280)={0x1f, 0x20, &(0x7f0000001f40)=@raw=[@alu={0x7, 0xa84498d3afdb0264, 0x1, 0x3, 0x6, 0x40, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, @ldst={0x1, 0x3, 0x7, 0x5, 0x4, 0xffffffffffffffe0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_val={0x18, 0x1, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000002040)='GPL\x00', 0x80000001, 0x63, &(0x7f0000002080)=""/99, 0x40f00, 0x60, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8, &(0x7f0000002100)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, r10, r3, 0x4, &(0x7f0000002200)=[r11], &(0x7f0000002240)=[{0x4, 0x5, 0x6}, {0x0, 0x3, 0x7, 0x375a9eeaac1dabcd}, {0x5, 0x3, 0x0, 0x675bf1ab60197fdc}, {0x0, 0x4, 0x0, 0xb}], 0x10, 0x8}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002400)={r4, &(0x7f0000002340), &(0x7f0000002380)=""/111}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002740)={r4, 0xe0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000002440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f0000002480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaf, &(0x7f0000002540)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000002580), &(0x7f00000025c0), 0x8, 0x71, 0x8, 0x8, &(0x7f0000002600)}}, 0x10) r14 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002980)=@bpf_lsm={0x1d, 0x5, &(0x7f0000002780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffff7}, [@alu={0x7, 0x0, 0xc, 0x5, 0x6, 0x100, 0x8}, @generic={0x40, 0x8, 0xa, 0x9, 0xca}]}, &(0x7f00000027c0)='syzkaller\x00', 0x5, 0x7e, &(0x7f0000002800)=""/126, 0xfc3eb866a77042c7, 0x2, '\x00', r7, 0x1b, r4, 0x8, &(0x7f0000002880)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000028c0)={0x1, 0x1, 0x9, 0x3}, 0x10, r10, 0x0, 0x2, &(0x7f0000002900)=[r6], &(0x7f0000002940)=[{0x4, 0x4, 0xe, 0xdd7b8a10fc4c65ae}, {0x2, 0x5, 0x2, 0x1}], 0x10, 0x80000000}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000002a40), 0x10200, 0x0) r15 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e40)={&(0x7f0000002d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7b, 0x7b, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x3}}, @int={0xb, 0x0, 0x0, 0x1, 0x0, 0xf, 0x0, 0x41}, @datasec={0x4, 0x2, 0x0, 0xf, 0x3, [{0x2, 0x3, 0xfb}, {0x1, 0x544d, 0xf}], "2bdc1e"}, @enum={0x9, 0x2, 0x0, 0x6, 0x4, [{0x6, 0x6f}, {0x6, 0x4}]}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x66, 0x0, 0x31, 0x5}]}, {0x0, [0x2e, 0x0, 0x0, 0x2e, 0x5f]}}, &(0x7f0000002e00)=""/6, 0x9b, 0x6, 0x0, 0x6}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002f80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000002f00), &(0x7f0000002f40)=r3}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003040)=@bpf_ext={0x1c, 0x2a, &(0x7f0000002a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_val={0x18, 0x0, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x1, 0xa, 0x3, 0xb, 0x100, 0x4}, @ldst={0x3, 0x1, 0x3, 0xc, 0x2, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002c00)='syzkaller\x00', 0x3, 0xf2, &(0x7f0000002c40)=""/242, 0x40f00, 0x1, '\x00', r7, 0x0, r15, 0x8, &(0x7f0000002e80)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000002ec0)={0x0, 0x6, 0xffff, 0x2c}, 0x10, 0x28591, r14, 0x2, &(0x7f0000002fc0)=[r4, r11, r16, r9, r9, r0, r6, r4, r9], &(0x7f0000003000)=[{0x5, 0x3, 0xf, 0x5}, {0x0, 0x5, 0x3, 0xc}], 0x10, 0x3}, 0x94) r17 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000003100)={0x0, 0x6}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000032c0)={r0, 0xffffffffffffffff}, 0x4) r19 = bpf$PROG_LOAD(0x5, &(0x7f00000033c0)={0x1a, 0x16, &(0x7f0000003140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x4}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xd}, @alu={0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_fd={0x18, 0x0, 0x1, 0x0, r17}, @initr0={0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @exit]}, &(0x7f0000003200)='syzkaller\x00', 0x101, 0x0, 0x0, 0x41100, 0x4, '\x00', r12, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000003240)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000003280)={0x2, 0x1, 0xa9, 0x5}, 0x10, r13, 0xffffffffffffffff, 0x5, &(0x7f0000003300)=[r18, r2], &(0x7f0000003340)=[{0x0, 0x4, 0x5, 0x4}, {0x4, 0x2, 0xc, 0xc}, {0x1, 0x4, 0xc, 0xc}, {0x5, 0x3, 0xd, 0x9}, {0x5, 0x5, 0x3}], 0x10, 0x162}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000003640)={0x8, 0x1, &(0x7f0000003480)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f00000034c0)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @fallback=0x1f, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f00000035c0)={0x5, 0x7, 0x7, 0x4}, 0x10, r13, r19, 0x0, &(0x7f0000003600), 0x0, 0x10, 0x9}, 0x94) 4m54.014357525s ago: executing program 2 (id=1249): perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x86e46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x80, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x3) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000004c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xaff}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x3f}, 0x90) (async) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 4m54.012448885s ago: executing program 4 (id=1250): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000003850000008b000000950000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="00000000000000b19369cf707f9200000000000000002a00"/35], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0xf, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x3, 0x80, 0x8, 0x8, 0xe4, 0x6, 0x0, 0x80, 0x100, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffbff, 0x2, @perf_bp={0x0, 0x5}, 0x4, 0xb76, 0x2, 0x6, 0x1, 0xad, 0x84, 0x0, 0x8, 0x0, 0x330}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x10003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40305829, &(0x7f0000000040)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x31) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x43101000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/154, 0x9a, 0x0, &(0x7f0000000100)=""/32, 0x20}}, 0x10) 4m53.947759482s ago: executing program 0 (id=1251): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x8000500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002000)=@generic={&(0x7f0000001000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x18}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') 4m53.914269185s ago: executing program 4 (id=1252): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0x1, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x2}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10001}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000000)='syzkaller\x00', 0x3, 0xa8, &(0x7f0000000340)=""/168, 0x41100, 0x6a, '\x00', r2, 0x1b, r3, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x0, 0x2, 0x52}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', r2, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, &(0x7f0000000980), 0x20000992) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0x1, 0x58, &(0x7f00000001c0)}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0), 0x4) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x2}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10001}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000000)='syzkaller\x00', 0x3, 0xa8, &(0x7f0000000340)=""/168, 0x41100, 0x6a, '\x00', r2, 0x1b, r3, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x0, 0x2, 0x52}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', r2, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) write$cgroup_pid(r5, &(0x7f0000000980), 0x20000992) (async) 4m53.813125695s ago: executing program 2 (id=1253): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xe62}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x10, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x9b}}]}, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1, 0x0, 0x0, 0x2044}, 0x60) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r9, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r11}, 0x10) ioctl$TUNGETVNETLE(r7, 0x40047451, &(0x7f0000000180)) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000), 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x76, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000002c0), &(0x7f0000000340), 0x8, 0x72, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r13, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="82958d04acd3aa3459ca35c8d891d6af28b08db10fb719f490c5d11e7fa2d3ef7a6e1f89b67ce825fc0c4c2c96d88b449c86962931c35c509fdb187326c0babc40ec951ae91d21ee5bff758d9d1db77241eda6b0f785771105c782851f6468b858c7e441f4a72769b2655df0c2c784abec1da50c47de916452179fc6c8056772c5c99d2bdffb4bde5db63b1bf778e6450169b44709a4f265ea474b2e8abd196e317aaa73ed7f6bf93136e074338da641313c409eea6f06d641c40a48818ec70ddaa9af1fb4cdc49a43be83d116c04a", @ANYRESHEX=r14], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r13, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) 4m53.804341936s ago: executing program 1 (id=1254): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) unlink(&(0x7f0000000000)='./file0\x00') 4m53.651413762s ago: executing program 0 (id=1255): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x4, &(0x7f00000001c0)=ANY=[], 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x28, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000010000000000000000900000018230000", @ANYRES32=r0, @ANYBLOB="00000000050a00000001000020207325c8fae1b200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000b7080000000000007b8af8ff00000000b7080000a68f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000008510000005000000851000000600000018260000", @ANYRES32=r0, @ANYBLOB="000000000500000018210000", @ANYRES32=r1, @ANYBLOB="0000000006000000"], &(0x7f0000000800)='GPL\x00', 0x650, 0xe5, &(0x7f0000000a00)=""/229, 0x40f00, 0x44, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000880)=[r0, r0, r0, r0, r0, r0], &(0x7f0000000940)=[{0x4, 0x4, 0x3, 0xa}, {0x5, 0x5, 0x8, 0xc}, {0x3, 0x2, 0x7, 0x6}, {0x5, 0x3, 0x10, 0x6}, {0x1, 0x5, 0x8}, {0x4, 0x1, 0x7}], 0x10, 0x2}, 0x94) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x28, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000010000000000000000900000018230000", @ANYRES32=r0, @ANYBLOB="00000000050a00000001000020207325c8fae1b200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000b7080000000000007b8af8ff00000000b7080000a68f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000008510000005000000851000000600000018260000", @ANYRES32=r0, @ANYBLOB="000000000500000018210000", @ANYRES32=r1, @ANYBLOB="0000000006000000"], &(0x7f0000000800)='GPL\x00', 0x650, 0xe5, &(0x7f0000000a00)=""/229, 0x40f00, 0x44, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000880)=[r0, r0, r0, r0, r0, r0], &(0x7f0000000940)=[{0x4, 0x4, 0x3, 0xa}, {0x5, 0x5, 0x8, 0xc}, {0x3, 0x2, 0x7, 0x6}, {0x5, 0x3, 0x10, 0x6}, {0x1, 0x5, 0x8}, {0x4, 0x1, 0x7}], 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000680)='qgroup_meta_convert\x00', r2, 0x0, 0x4}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000680)='qgroup_meta_convert\x00', r2, 0x0, 0x4}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) (async) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000fc0)=""/4096, 0x1000}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0xc}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0xc}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x66255b80b19fd67e}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdd, 0x3, 0x0, 0x0, 0x0, 0x4000000000, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0xf}, 0xffffffffffffffff, 0x400000000000, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000340)=ANY=[@ANYBLOB="1200000002000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000611200"/28], 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB='\a'], 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r6, @ANYRESHEX=r7, @ANYRESOCT=r5], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) (async) close(r11) mkdir(0x0, 0x0) (async) mkdir(0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xfc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xaf2}, 0x4831, 0x1, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r12, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) close(r13) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r14, &(0x7f00000005c0)=ANY=[], 0xfdef) 4m53.613121705s ago: executing program 4 (id=1256): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xfc, 0x0, 0x2, 0x4, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xe}, 0x4200, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x2, 0x2, 0x4}, 0x50) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000200)=[{0x40, 0x4, 0xb, 0xfffffff9}, {0x1, 0x0, 0x5, 0x7f}]}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8941, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000001080)=ANY=[@ANYBLOB="08000000040000000400000022bf0000000000002a", @ANYRES32, @ANYBLOB="ffffffff00"/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000002100000004000000eb"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r8}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 4m53.552574782s ago: executing program 3 (id=1257): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e880000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x20, 0x0, 0x10, 0x40, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x10000, 0xc8, 0x5, 0x0, 0x8, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r7, &(0x7f0000000240)=0x6fa6, 0x12) openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xfffffffd, 0x2}]}]}}, 0x0, 0x32}, 0x28) close(r9) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@fallback=r10, 0x33, 0x0, 0x2, &(0x7f00000002c0)=[0x0], 0x1, 0x0, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_type(r11, &(0x7f0000000580), 0x2, 0x0) 4m53.544597732s ago: executing program 2 (id=1258): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000009c000000010001000900000001000000", @ANYRES32, @ANYBLOB="fdffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00'], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000400"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000280), 0x6, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="18181100004000000000000000000000000000003e1097c93e2b5facb40cb1773ed33a954bf2dbb7b259516ae766a8d1f9dd3303402974f3d56016f1b90db36041094f16f8c5302591af77cdb5a177877bcab1b590e942dbcca6240d4d1624985067341896d21adf0ebb5195ef0794d8d8fa8c8905eff99fdaeb018d711437a3de4442122cadb72a1c6bd011ed1ab8f92ef86140415dad67c054f2913966fd3879d07ec9424da442f934b01b712b90537c5c7753d8a4ea75f3de98105933136e38a09cbc9ab4636c27a16f067f06ed028e924bd64caa4bb899f826a93c0b79c01caf9d445c0e3f3239", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1a900, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'vxcan1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000008"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1e, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x9b36}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xb, 0x4, 0x7fe2, 0x3f}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x2301c0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r5) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e880000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) close(r6) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r4) 4m53.531704783s ago: executing program 1 (id=1259): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000300)={&(0x7f00000001c0)=""/165, 0xa5, 0x0, &(0x7f0000000280)=""/117, 0x75}}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x50) (async, rerun: 64) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0xd7b5, 0x0, 0xffffffffffffffff, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x50) (rerun: 64) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x18, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1860000}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000100)=""/47, 0x41000, 0x48, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000180)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, r1, 0x0, 0x0, &(0x7f0000000480)=[r2, r3], 0x0, 0x10, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000580)={0x0, r4}, 0x10) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x80000, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x7, 0x4, &(0x7f0000000600)=@raw=[@cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x1}], &(0x7f0000000640)='syzkaller\x00', 0x820d, 0xdd, &(0x7f0000000680)=""/221, 0x41000, 0x8, '\x00', 0x0, @fallback=0x34, r0, 0x8, &(0x7f0000000780)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, r1, r4, 0x4, &(0x7f0000000800)=[r3, r3, r3, r3, r6, r3, r3], &(0x7f0000000840)=[{0x3, 0x2, 0xa, 0x4}, {0x3, 0x3, 0xe, 0xc}, {0x3, 0x4, 0x1, 0xb}, {0x5, 0x1, 0x3, 0x8}], 0x10, 0x7fffffff}, 0x94) (async, rerun: 32) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000940)) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a00)={r2, 0x58, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000a40)=r7) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r3}, 0x8) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000ac0), 0x420282, 0x0) ioctl$TUNGETVNETLE(r9, 0x800454dd, &(0x7f0000000b00)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000b40), 0x2400, 0x0) socketpair(0xa, 0x800, 0x5, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r10, &(0x7f0000002080)={&(0x7f0000000bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000000c40)=""/247, 0xf7}, {&(0x7f0000000d40)=""/129, 0x81}, {&(0x7f0000000e00)=""/253, 0xfd}, {&(0x7f0000000f00)=""/89, 0x59}, {&(0x7f0000000f80)=""/4096, 0x1000}], 0x5, &(0x7f0000002000)=""/87, 0x57}, 0x2) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)=@generic={&(0x7f00000020c0)='./file0\x00', 0x0, 0x18}, 0x18) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002140)=r1, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', r7, r11, 0x0, 0x3, 0x1}, 0x50) (async, rerun: 32) r12 = openat$cgroup(r8, &(0x7f0000002200)='syz1\x00', 0x200002, 0x0) (rerun: 32) openat$cgroup_freezer_state(r12, &(0x7f0000002240), 0x2, 0x0) r13 = openat$cgroup_ro(r8, &(0x7f0000002280)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000022c0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x8, '\x00', r7, r13, 0x0, 0x4, 0x4}, 0x50) (async) r14 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002380)=@generic={&(0x7f0000002340)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000024c0)={@fallback=r4, 0x4, 0x1, 0x7, &(0x7f00000023c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000002400)=[0x0, 0x0], &(0x7f0000002440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002500)={@ifindex=r7, r14, 0x1d, 0x2000, r4, @value=r8, @void, @void, @void, r16}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r15, &(0x7f0000002540)="33f06c3eed193b3f9bd61e8534f4cfed19c6421fecc03cc88736ac4c796e0cb80515465afeb934d84652966a9d04ae33b3df886fa5dcab9fe55583757a890a55abb2fd3ed9ed871bbbc60c2621c4322b0cc9f98c308d2b5eb72943dbc215e4cdf2dd3bf3ef15450e49371ce3aa77d52a602dfddc21d3bc067112dbfc7494ef731ce33a1fc33aa2b1603f1555dff1ac6f8615b111286b7963054751e4450c9b7305d61f741dc69f3f39796a1693125a317f58af9a0b16193de4d5df3897ff049bb1272bf05481f36dcfd7eb041f", &(0x7f0000002640)=""/185, 0x4}, 0x20) (async, rerun: 64) ioctl$TUNSETNOCSUM(r15, 0x400454c8, 0x0) 4m53.47423571s ago: executing program 0 (id=1260): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r0, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', r0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xe, 0x4, 0x8, 0x8001, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x32, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4m53.47147061s ago: executing program 2 (id=1261): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000002000000020000000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000002"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00'}, 0x80) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000ffffffffddffdcfffffffffd5f5f"], 0x48) r2 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r3], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x44}, 0x50) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) 4m53.405254286s ago: executing program 1 (id=1262): r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc008}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1d, 0x1e, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x4}, @tail_call, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_fd={0x18, 0x3}, @jmp={0x5, 0x0, 0x6, 0xb, 0x7, 0x80, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='syzkaller\x00', 0xb07, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x0, 0x5, 0x5, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, 0x0, &(0x7f00000004c0)=[{0x1, 0x3, 0x10, 0x1}, {0x2, 0x2, 0xb, 0xc}, {0x3, 0x5, 0xc, 0x8}, {0x3, 0x1, 0x1}, {0x5, 0x5, 0xe, 0x9}, {0x5, 0x3, 0xf, 0x3}, {0x4, 0x8, 0x2}, {0x3, 0x5, 0x0, 0x8}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@fallback=0xffffffffffffffff, 0x24, 0x1, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0], 0x0}, 0x40) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r6, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xd, 0xe, &(0x7f0000000940)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_val={0x18, 0xb, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x16c6}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', r10, @sock_ops, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r12, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000840)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r13, r12, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000240)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x41d}, @exit, @map_fd={0x18, 0x0, 0x1, 0x0, r5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8}], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xe0, &(0x7f0000000580)=""/224, 0x41000, 0x0, '\x00', r10, 0x1b, r9, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x1, 0x42, 0x6}, 0x10, r13, 0x0, 0x5, &(0x7f00000007c0)=[r8, r7, r6, r4, r5, r6, r4], &(0x7f0000000800)=[{0x1, 0x2, 0x9, 0x6}, {0x5, 0x1, 0x9, 0xc}, {0x3, 0x1, 0x2, 0xb}, {0x0, 0x5, 0xd, 0xb}, {0x5, 0x4, 0x5, 0x3}], 0x10, 0xc20}, 0x94) r14 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000780)=@o_path={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@ifindex=r10, r0, 0x1f, 0x1, r1, @void, @value=r14, @void, @void, r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r15 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r16, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r15, &(0x7f00000002c0)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) 4m37.50790827s ago: executing program 32 (id=1260): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r0, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', r0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xe, 0x4, 0x8, 0x8001, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x32, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4m37.457848525s ago: executing program 33 (id=1262): r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc008}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1d, 0x1e, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x4}, @tail_call, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_fd={0x18, 0x3}, @jmp={0x5, 0x0, 0x6, 0xb, 0x7, 0x80, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='syzkaller\x00', 0xb07, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x0, 0x5, 0x5, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, 0x0, &(0x7f00000004c0)=[{0x1, 0x3, 0x10, 0x1}, {0x2, 0x2, 0xb, 0xc}, {0x3, 0x5, 0xc, 0x8}, {0x3, 0x1, 0x1}, {0x5, 0x5, 0xe, 0x9}, {0x5, 0x3, 0xf, 0x3}, {0x4, 0x8, 0x2}, {0x3, 0x5, 0x0, 0x8}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@fallback=0xffffffffffffffff, 0x24, 0x1, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0], 0x0}, 0x40) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r6, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xd, 0xe, &(0x7f0000000940)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_val={0x18, 0xb, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x16c6}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', r10, @sock_ops, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r12, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000840)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r13, r12, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000240)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x41d}, @exit, @map_fd={0x18, 0x0, 0x1, 0x0, r5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8}], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xe0, &(0x7f0000000580)=""/224, 0x41000, 0x0, '\x00', r10, 0x1b, r9, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x1, 0x42, 0x6}, 0x10, r13, 0x0, 0x5, &(0x7f00000007c0)=[r8, r7, r6, r4, r5, r6, r4], &(0x7f0000000800)=[{0x1, 0x2, 0x9, 0x6}, {0x5, 0x1, 0x9, 0xc}, {0x3, 0x1, 0x2, 0xb}, {0x0, 0x5, 0xd, 0xb}, {0x5, 0x4, 0x5, 0x3}], 0x10, 0xc20}, 0x94) r14 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000780)=@o_path={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@ifindex=r10, r0, 0x1f, 0x1, r1, @void, @value=r14, @void, @void, r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r15 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r16, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r15, &(0x7f00000002c0)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) 4m37.446261747s ago: executing program 34 (id=1261): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000002000000020000000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000002"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00'}, 0x80) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000ffffffffddffdcfffffffffd5f5f"], 0x48) r2 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r3], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x44}, 0x50) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) 4m37.407304261s ago: executing program 35 (id=1257): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e880000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x20, 0x0, 0x10, 0x40, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x10000, 0xc8, 0x5, 0x0, 0x8, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r7, &(0x7f0000000240)=0x6fa6, 0x12) openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xfffffffd, 0x2}]}]}}, 0x0, 0x32}, 0x28) close(r9) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@fallback=r10, 0x33, 0x0, 0x2, &(0x7f00000002c0)=[0x0], 0x1, 0x0, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_type(r11, &(0x7f0000000580), 0x2, 0x0) 4m37.363362855s ago: executing program 36 (id=1256): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xfc, 0x0, 0x2, 0x4, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xe}, 0x4200, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x2, 0x2, 0x4}, 0x50) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000200)=[{0x40, 0x4, 0xb, 0xfffffff9}, {0x1, 0x0, 0x5, 0x7f}]}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8941, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000001080)=ANY=[@ANYBLOB="08000000040000000400000022bf0000000000002a", @ANYRES32, @ANYBLOB="ffffffff00"/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000002100000004000000eb"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r8}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 29.340242038s ago: executing program 8 (id=4501): perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x2}, 0x80, 0x0, 0x0, 0x4, 0xfff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8b2b, &(0x7f0000000040)={'wlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) 29.339170438s ago: executing program 8 (id=4504): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x2}, 0xc800, 0x0, 0xfffffffc, 0x9, 0xb0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x150a3984, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x4084, 0x400, 0x7, 0x0, 0xa, 0x0, 0x0, 0x0, 0x4008, 0x0, 0xfffffffffffffffd}, 0x0, 0xfff0000000000001, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) syz_clone(0x100080, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40010040) 29.281079754s ago: executing program 9 (id=4506): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, r0, 0x0) 29.256629556s ago: executing program 8 (id=4508): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 29.202796772s ago: executing program 9 (id=4510): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x14, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) 29.145119938s ago: executing program 8 (id=4514): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x28) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x14, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={@fallback=r3, 0x11, 0x0, 0x4, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x5, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) 29.143011508s ago: executing program 9 (id=4515): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x74}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x21}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x2}, 0xc800, 0x0, 0xfffffffc, 0x9, 0xb0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0xfffffffe, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000780)={0x2, &(0x7f0000000600)=[{0x5}, {0x6}]}) 29.039366028s ago: executing program 5 (id=4522): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(0xfffffffffffffffe, 0x0, 0xd, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 29.013052601s ago: executing program 9 (id=4523): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x10002) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000800)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f086dd", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 28.941092218s ago: executing program 8 (id=4525): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000002000000000000000000000800000"], 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x8a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x105d30, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000feffffff850000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="620ac4ff00000000711046000000000095"], &(0x7f0000000100)='GPL\x00'}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r2}, 0x0, &(0x7f0000000740), 0x2}, 0x20) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e6026, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x9}, 0x402, 0x1000, 0x0, 0x1, 0x7, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="660a0000000000006111990000000000"], &(0x7f0000000000)='GPL\x00'}, 0x94) socketpair(0x28, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000ffffb703000008000000b704ffffffffffff840000000300000095000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0x1, 0x80}, 0x1b) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) 28.859352646s ago: executing program 9 (id=4526): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7000000000000007b5af8ff00000000bfa200000000000007020000d6ffffffb703000008000000b704000000000000850000001400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0xcc03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0xe, 0x0, &(0x7f0000000740)="000000000000c000ee6e3e20630c", 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 28.830550989s ago: executing program 5 (id=4527): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0xf, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x1d00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x29e0}, 0x1051ec, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x0, 0x0, &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1, 0x2, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x70}, [@ldst={0x6, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x0, 'io'}]}, 0x4) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x28) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x80047456, &(0x7f0000001200)) 28.653334057s ago: executing program 7 (id=4529): perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x50b, 0x2}, 0x10410, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 28.646637637s ago: executing program 7 (id=4530): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 28.561428576s ago: executing program 9 (id=4532): bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000004c0)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xe) 28.560455616s ago: executing program 5 (id=4533): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0x806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000780), 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x2800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, 0x0, &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x5, 0xe, 0x0, &(0x7f0000000280)="6a370000000000001f71a76d2688", 0x0, 0xd00, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffdbb, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1401, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xdc}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xded}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x4, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000033c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000002f40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}], 0x20}, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xffc0) 28.533748239s ago: executing program 6 (id=4534): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xd}, 0x806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xa9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(0x0, r2, 0xb, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305828, &(0x7f0000000040)) 28.501940522s ago: executing program 7 (id=4535): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xd}, 0x806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071118300000000008510000002000000850000005500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) 28.42558227s ago: executing program 7 (id=4536): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1414}, 0x48) 28.42532005s ago: executing program 5 (id=4537): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003700)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x101) 28.396443362s ago: executing program 8 (id=4538): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x7116f40f8d8a71ce}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'syzkaller0\x00', 0x400}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 28.381046394s ago: executing program 5 (id=4539): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1a, 0xf, &(0x7f0000000000)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000980)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x2a, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) 28.308311661s ago: executing program 7 (id=4540): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000400), &(0x7f0000000140)}, 0x20) 28.307737532s ago: executing program 6 (id=4541): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x18) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_pid(r2, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00', r3}, 0x18) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000340), 0x5, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.freeze\x00', 0x100002, 0x0) write$cgroup_type(r10, &(0x7f0000000180), 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) sendmsg$inet(r4, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) 27.828800499s ago: executing program 5 (id=4542): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004020000080000d0f49153b946376100", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./cgroup\x00', r3}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000004000000000000000000000018110000", @ANYRES32, @ANYBLOB="79d1000000000000b702000014000000b70a0000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000009f5099500"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/mnt\x00') ioctl$TUNSETIFF(r7, 0xb701, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa, 0x0, 0xd0ff}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x45}, {0x6}]}) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x72}, [@ldst={0x3, 0x3, 0x3, 0x1c10a1, 0x0, 0x98}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305828, &(0x7f0000000040)) 27.102507192s ago: executing program 7 (id=4543): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0xa0380, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="1e0301003c05000128876b60864668f82ffdeefa000000000000ffd2acb165fe580cd568020031b87b548cb74136f366da0abe01880b"], 0xffdd) 22.884987346s ago: executing program 6 (id=4544): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000000)="86dd38c6ede1b97752de00421a4983", 0x0, 0x5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 17.330534242s ago: executing program 6 (id=4545): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x96b9, 0x0, 0x0, 0x0, 0xf6c3}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0xd746}]}, &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 16.807953455s ago: executing program 6 (id=4546): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r0, 0x0, 0x0, 0x4}, 0x20) 16.305876605s ago: executing program 6 (id=4547): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001340), 0x100, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001380)={'dvmrp1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)={0x1, 0x9, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}, @multicast, @random="0e9a2357c564", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @random="d339fe0ad70e", @multicast, @local, @random="c6da8315de46", @dev={'\xaa\xaa\xaa\xaa\xaa', 0xd}]}) 12.631523114s ago: executing program 37 (id=4538): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x7116f40f8d8a71ce}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'syzkaller0\x00', 0x400}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 11.281166599s ago: executing program 38 (id=4532): bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000004c0)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xe) 10.869319481s ago: executing program 39 (id=4542): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004020000080000d0f49153b946376100", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./cgroup\x00', r3}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000004000000000000000000000018110000", @ANYRES32, @ANYBLOB="79d1000000000000b702000014000000b70a0000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000009f5099500"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/mnt\x00') ioctl$TUNSETIFF(r7, 0xb701, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa, 0x0, 0xd0ff}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x45}, {0x6}]}) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x72}, [@ldst={0x3, 0x3, 0x3, 0x1c10a1, 0x0, 0x98}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305828, &(0x7f0000000040)) 10.279927129s ago: executing program 40 (id=4543): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0xa0380, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="1e0301003c05000128876b60864668f82ffdeefa000000000000ffd2acb165fe580cd568020031b87b548cb74136f366da0abe01880b"], 0xffdd) 0s ago: executing program 41 (id=4547): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001340), 0x100, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001380)={'dvmrp1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)={0x1, 0x9, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}, @multicast, @random="0e9a2357c564", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @random="d339fe0ad70e", @multicast, @local, @random="c6da8315de46", @dev={'\xaa\xaa\xaa\xaa\xaa', 0xd}]}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.16' (ED25519) to the list of known hosts. [ 20.411416][ T24] audit: type=1400 audit(1763417450.030:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.412736][ T267] cgroup: Unknown subsys name 'net' [ 20.434639][ T24] audit: type=1400 audit(1763417450.030:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.463461][ T24] audit: type=1400 audit(1763417450.060:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.463706][ T267] cgroup: Unknown subsys name 'devices' [ 20.695933][ T267] cgroup: Unknown subsys name 'hugetlb' [ 20.701702][ T267] cgroup: Unknown subsys name 'rlimit' [ 20.933318][ T24] audit: type=1400 audit(1763417450.550:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.957089][ T24] audit: type=1400 audit(1763417450.550:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.976343][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.983034][ T24] audit: type=1400 audit(1763417450.550:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.015273][ T24] audit: type=1400 audit(1763417450.620:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.040686][ T24] audit: type=1400 audit(1763417450.620:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 21.121990][ T24] audit: type=1400 audit(1763417450.740:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.149900][ T24] audit: type=1400 audit(1763417450.740:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.149911][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.090473][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.097933][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.105776][ T276] device bridge_slave_0 entered promiscuous mode [ 22.115054][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.122611][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.132299][ T276] device bridge_slave_1 entered promiscuous mode [ 22.166782][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.174474][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.182552][ T275] device bridge_slave_0 entered promiscuous mode [ 22.210108][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.218349][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.226718][ T275] device bridge_slave_1 entered promiscuous mode [ 22.300307][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.307691][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.315940][ T278] device bridge_slave_0 entered promiscuous mode [ 22.322615][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.330029][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.337718][ T277] device bridge_slave_0 entered promiscuous mode [ 22.347323][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.354818][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.362812][ T277] device bridge_slave_1 entered promiscuous mode [ 22.372015][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.379892][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.387691][ T278] device bridge_slave_1 entered promiscuous mode [ 22.471155][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.479243][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.486924][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.494135][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.510610][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.518052][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.526541][ T279] device bridge_slave_0 entered promiscuous mode [ 22.533708][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.541520][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.549636][ T279] device bridge_slave_1 entered promiscuous mode [ 22.613107][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.620291][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.627965][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.635106][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.657730][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.665734][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.673224][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.680824][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.689999][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.698001][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.721301][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.729962][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.737027][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.750438][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.768289][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.777326][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.785074][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.798671][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.807416][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.825642][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.833111][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.841705][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.848884][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.857126][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.865958][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.873303][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.881671][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.896762][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.905785][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.913035][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.929182][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.937524][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.944674][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.952195][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.963391][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.982675][ T276] device veth0_vlan entered promiscuous mode [ 22.990862][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.999923][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.007745][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.016517][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.024558][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.032193][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.040783][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.050379][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.057621][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.065703][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.075687][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.083233][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.092083][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.113027][ T276] device veth1_macvtap entered promiscuous mode [ 23.120599][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.129654][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.138488][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.147468][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.156823][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.164104][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.171637][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.181103][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.190766][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.197953][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.205751][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.214405][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.222861][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.231004][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.240311][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.248746][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.264009][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.272323][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.280926][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.290239][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.298439][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.307061][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.328260][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.337140][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.346458][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.357319][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.366650][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.375967][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.389953][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.398936][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.410637][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.419217][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.433229][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.446063][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.459587][ T278] device veth0_vlan entered promiscuous mode [ 23.475821][ T275] device veth0_vlan entered promiscuous mode [ 23.483812][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.491158][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 23.495584][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.510830][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.519020][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.527490][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.535180][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.542564][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.550199][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.559992][ T278] device veth1_macvtap entered promiscuous mode [ 23.568282][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.579916][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.588738][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.602603][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.612491][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.621043][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.629648][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.638734][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.653466][ T279] device veth0_vlan entered promiscuous mode [ 23.675154][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.683463][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.692577][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.701360][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.719947][ T275] device veth1_macvtap entered promiscuous mode [ 23.740251][ T279] device veth1_macvtap entered promiscuous mode [ 23.754108][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.762767][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.771581][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.779802][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.788712][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.802963][ T277] device veth0_vlan entered promiscuous mode [ 23.841624][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.851233][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.861342][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.872589][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.883843][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.896069][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.923965][ C1] hrtimer: interrupt took 36915 ns [ 23.930026][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.938168][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.977560][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.038145][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.049416][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.058505][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.067658][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.078163][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.099098][ T277] device veth1_macvtap entered promiscuous mode [ 24.118637][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.128145][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.138266][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.156041][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.165052][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.223433][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.265284][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.905121][ T327] device syzkaller0 entered promiscuous mode [ 25.401066][ T363] cgroup: syz.0.17 (363) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 25.425667][ T363] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.536489][ T24] kauditd_printk_skb: 42 callbacks suppressed [ 25.536502][ T24] audit: type=1400 audit(1763417455.150:116): avc: denied { create } for pid=336 comm="syz.3.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 25.851094][ T24] audit: type=1400 audit(1763417455.470:117): avc: denied { create } for pid=374 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 25.965804][ T24] audit: type=1400 audit(1763417455.550:118): avc: denied { ioctl } for pid=374 comm="syz.0.19" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.688390][ T24] audit: type=1400 audit(1763417456.310:119): avc: denied { read } for pid=397 comm="syz.2.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.855317][ T24] audit: type=1400 audit(1763417456.410:120): avc: denied { create } for pid=401 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 26.918893][ T24] audit: type=1400 audit(1763417456.430:121): avc: denied { create } for pid=401 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 28.113243][ T24] audit: type=1400 audit(1763417457.730:122): avc: denied { cpu } for pid=427 comm="syz.3.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.792781][ T452] device wg2 entered promiscuous mode [ 28.918848][ T461] ------------[ cut here ]------------ [ 28.984191][ T461] trace type BPF program uses run-time allocation [ 29.264164][ T461] WARNING: CPU: 1 PID: 461 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 29.694065][ T461] Modules linked in: [ 29.705282][ T461] CPU: 1 PID: 461 Comm: syz.3.40 Not tainted syzkaller #0 [ 29.719863][ T461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 29.731839][ T461] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 29.739744][ T461] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 80 7a 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 29.860722][ T461] RSP: 0018:ffffc90000d27468 EFLAGS: 00010246 [ 29.874701][ T461] RAX: 6494ba8b3f3b0400 RBX: 0000000000000001 RCX: 0000000000080000 [ 29.926848][ T461] RDX: ffffc90002ce1000 RSI: 000000000000210a RDI: 000000000000210b [ 29.944052][ T461] RBP: ffffc90000d274b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 29.974232][ T461] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff888111c90000 [ 30.032370][ T461] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811256c000 [ 30.106204][ T461] FS: 00007f3ac024c6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 30.164015][ T461] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.180952][ T461] CR2: 000020000055d000 CR3: 000000010e968000 CR4: 00000000003506b0 [ 30.236497][ T461] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.271097][ T461] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 30.299767][ T461] Call Trace: [ 30.303252][ T461] ? __fdget+0x1a1/0x230 [ 30.344544][ T461] resolve_pseudo_ldimm64+0x526/0x1020 [ 30.350311][ T461] ? bpf_check+0xd680/0xd680 [ 30.385424][ T461] ? kvmalloc_node+0x88/0x130 [ 30.390397][ T461] bpf_check+0x8d4b/0xd680 [ 30.396768][ T461] ? bpf_get_btf_vmlinux+0x60/0x60 [ 30.402431][ T461] ? 0xffffffffa00280a0 [ 30.407329][ T461] ? is_bpf_text_address+0x177/0x190 [ 30.413822][ T461] ? selinux_bpf_prog_alloc+0x51/0x140 [ 30.430363][ T461] ? __kernel_text_address+0xa0/0x100 [ 30.438478][ T461] ? unwind_get_return_address+0x4d/0x90 [ 30.453688][ T461] ? stack_trace_save+0xe0/0xe0 [ 30.528773][ T461] ? arch_stack_walk+0xee/0x140 [ 30.535380][ T461] ? stack_trace_save+0x98/0xe0 [ 30.540498][ T461] ? stack_trace_snprint+0xf0/0xf0 [ 30.546793][ T461] ? __kasan_slab_alloc+0x69/0xf0 [ 30.552185][ T461] ? pcpu_block_update+0x3ec/0x900 [ 30.557450][ T461] ? selinux_bpf_prog_alloc+0x51/0x140 [ 30.563660][ T461] ? __kasan_kmalloc+0xec/0x110 [ 30.569084][ T461] ? __kasan_kmalloc+0xda/0x110 [ 30.574504][ T461] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 30.580888][ T461] ? selinux_bpf_prog_alloc+0x51/0x140 [ 30.592064][ T461] ? security_bpf_prog_alloc+0x62/0x90 [ 30.598410][ T461] ? bpf_prog_load+0x949/0x1420 [ 30.603627][ T461] ? __se_sys_bpf+0x442/0x680 [ 30.608795][ T461] ? __x64_sys_bpf+0x7b/0x90 [ 30.694034][ T461] ? do_syscall_64+0x31/0x40 [ 30.698699][ T461] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 30.891410][ T461] ? memset+0x35/0x40 [ 30.917919][ T461] ? bpf_obj_name_cpy+0x193/0x1e0 [ 30.923547][ T461] bpf_prog_load+0xf5a/0x1420 [ 30.956354][ T499] syz.1.51[499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.956456][ T499] syz.1.51[499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.044508][ T461] ? map_freeze+0x320/0x320 [ 31.114031][ T461] ? selinux_bpf+0xc7/0xf0 [ 31.119298][ T461] ? security_bpf+0x82/0xa0 [ 31.169631][ T497] device syzkaller0 entered promiscuous mode [ 31.176835][ T461] __se_sys_bpf+0x442/0x680 [ 31.181544][ T461] ? __x64_sys_bpf+0x90/0x90 [ 31.284076][ T461] ? __kasan_check_read+0x11/0x20 [ 31.296919][ T461] __x64_sys_bpf+0x7b/0x90 [ 31.307390][ T461] do_syscall_64+0x31/0x40 [ 31.316467][ T461] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 31.330442][ T461] RIP: 0033:0x7f3ac18056c9 [ 31.362883][ T461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.408809][ T461] RSP: 002b:00007f3ac024c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 31.428972][ T461] RAX: ffffffffffffffda RBX: 00007f3ac1a5c090 RCX: 00007f3ac18056c9 [ 31.451847][ T461] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 31.587357][ T461] RBP: 00007f3ac1887f91 R08: 0000000000000000 R09: 0000000000000000 [ 31.729511][ T24] audit: type=1400 audit(1763417461.350:123): avc: denied { create } for pid=513 comm="syz.4.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 31.754391][ T461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 31.868475][ T461] R13: 00007f3ac1a5c128 R14: 00007f3ac1a5c090 R15: 00007ffecb04ba28 [ 31.927130][ T461] ---[ end trace 84dd436a15433328 ]--- [ 32.340220][ T24] audit: type=1400 audit(1763417461.960:124): avc: denied { create } for pid=532 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 32.772030][ T555] device syzkaller0 entered promiscuous mode [ 33.056996][ T24] audit: type=1400 audit(1763417462.680:125): avc: denied { relabelfrom } for pid=574 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.086601][ T575] device pim6reg1 entered promiscuous mode [ 33.104911][ T24] audit: type=1400 audit(1763417462.680:126): avc: denied { relabelto } for pid=574 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.147969][ T24] audit: type=1400 audit(1763417462.730:127): avc: denied { setopt } for pid=579 comm="syz.0.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.384750][ T666] syz.3.100 (666) used obsolete PPPIOCDETACH ioctl [ 35.603792][ T24] audit: type=1400 audit(1763417465.210:128): avc: denied { create } for pid=684 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 35.691234][ T24] audit: type=1400 audit(1763417465.280:129): avc: denied { write } for pid=684 comm="syz.2.104" name="cgroup.subtree_control" dev="cgroup2" ino=69 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 35.719549][ T24] audit: type=1400 audit(1763417465.300:130): avc: denied { open } for pid=684 comm="syz.2.104" path="" dev="cgroup2" ino=69 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 36.734069][ T719] device syzkaller0 entered promiscuous mode [ 37.226788][ T764] device veth1_macvtap left promiscuous mode [ 37.309561][ T772] device veth1_macvtap entered promiscuous mode [ 37.324978][ T772] device macsec0 entered promiscuous mode [ 37.375268][ T785] syz.1.125 uses obsolete (PF_INET,SOCK_PACKET) [ 37.412748][ T24] audit: type=1400 audit(1763417467.030:131): avc: denied { create } for pid=759 comm="syz.4.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 38.687453][ T814] : renamed from veth0_vlan [ 39.513045][ T24] audit: type=1400 audit(1763417469.130:132): avc: denied { create } for pid=834 comm="syz.4.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 40.055873][ T843] device pim6reg1 entered promiscuous mode [ 40.386575][ T846] device syzkaller0 entered promiscuous mode [ 41.217523][ T872] device pim6reg1 entered promiscuous mode [ 42.037793][ T24] audit: type=1400 audit(1763417471.660:133): avc: denied { tracepoint } for pid=897 comm="syz.4.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 43.212257][ T994] syz.3.186[994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.212325][ T994] syz.3.186[994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.574597][ T1013] device veth0_vlan left promiscuous mode [ 43.659912][ T1013] device veth0_vlan entered promiscuous mode [ 43.737372][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.763715][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.795109][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.811240][ T1027] device wg2 entered promiscuous mode [ 43.883023][ T1040] device pim6reg1 entered promiscuous mode [ 45.161807][ T24] audit: type=1400 audit(1763417474.780:134): avc: denied { create } for pid=1114 comm="syz.3.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 45.222129][ T24] audit: type=1400 audit(1763417474.810:135): avc: denied { create } for pid=1096 comm="syz.0.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 45.255623][ T24] audit: type=1400 audit(1763417474.830:136): avc: denied { create } for pid=1100 comm="syz.2.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 45.316509][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.894017][ T24] audit: type=1400 audit(1763417476.490:137): avc: denied { ioctl } for pid=1200 comm="syz.1.234" path="" dev="cgroup2" ino=255 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.601584][ T1264] device veth0_vlan left promiscuous mode [ 48.614475][ T1264] device veth0_vlan entered promiscuous mode [ 48.748941][ T1274] device wg2 left promiscuous mode [ 48.757668][ T1268] device wg2 entered promiscuous mode [ 49.371872][ T1297] device sit0 entered promiscuous mode [ 51.267429][ T1360] device pim6reg1 entered promiscuous mode [ 51.993140][ T1404] device pim6reg1 entered promiscuous mode [ 54.742361][ T1484] device syzkaller0 entered promiscuous mode [ 55.770393][ T24] audit: type=1400 audit(1763417485.390:138): avc: denied { create } for pid=1504 comm="syz.3.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 55.875208][ T1509] device pim6reg1 entered promiscuous mode [ 56.615575][ T24] audit: type=1400 audit(1763417486.240:139): avc: denied { create } for pid=1532 comm="syz.0.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 56.672347][ T1531] device sit0 entered promiscuous mode [ 56.685412][ T24] audit: type=1400 audit(1763417486.290:140): avc: denied { create } for pid=1529 comm="syz.4.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 56.788870][ T24] audit: type=1400 audit(1763417486.400:141): avc: denied { create } for pid=1549 comm="syz.1.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 57.797790][ T1597] device pim6reg1 entered promiscuous mode [ 60.430343][ T24] audit: type=1400 audit(1763417490.050:142): avc: denied { create } for pid=1673 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 60.468465][ T24] audit: type=1400 audit(1763417490.060:143): avc: denied { create } for pid=1678 comm="syz.3.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 60.922749][ T1713] syz.4.378[1713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.922810][ T1713] syz.4.378[1713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.953068][ T1706] device pim6reg1 entered promiscuous mode [ 60.973285][ T1717] syz.4.378[1717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.973338][ T1717] syz.4.378[1717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.289505][ T1729] device syzkaller0 entered promiscuous mode [ 61.774144][ T1757] device sit0 left promiscuous mode [ 61.842454][ T1745] device sit0 entered promiscuous mode [ 62.009525][ T1763] device syzkaller0 entered promiscuous mode [ 62.074330][ T1778] device veth0_vlan left promiscuous mode [ 62.083545][ T1778] device veth0_vlan entered promiscuous mode [ 62.234637][ T1773] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.244430][ T1773] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.630422][ T1806] device syzkaller0 entered promiscuous mode [ 62.931570][ T1818] device veth0_vlan left promiscuous mode [ 62.940495][ T1818] device veth0_vlan entered promiscuous mode [ 62.965417][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.980229][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.990409][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.233263][ T1840] device pim6reg1 entered promiscuous mode [ 64.563388][ T1905] device veth1_macvtap left promiscuous mode [ 64.571033][ T1905] device macsec0 entered promiscuous mode [ 64.798915][ T24] audit: type=1400 audit(1763417494.420:144): avc: denied { create } for pid=1915 comm="syz.0.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.347169][ T1930] device pim6reg1 entered promiscuous mode [ 65.546797][ T24] audit: type=1400 audit(1763417495.170:145): avc: denied { create } for pid=1935 comm="syz.1.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 65.585269][ T1936] device sit0 entered promiscuous mode [ 66.497239][ T1953] device syzkaller0 entered promiscuous mode [ 66.543615][ T1960] device wg2 left promiscuous mode [ 66.641841][ T1962] device wg2 entered promiscuous mode [ 68.000733][ T2001] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.012375][ T2001] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.301256][ T2004] device syzkaller0 entered promiscuous mode [ 69.494630][ T2031] syz.4.464[2031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.494687][ T2031] syz.4.464[2031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.524488][ T2030] syz.4.464[2030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.758431][ T2041] device veth1_macvtap left promiscuous mode [ 70.809960][ T24] audit: type=1400 audit(1763417500.430:146): avc: denied { create } for pid=2078 comm="syz.1.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 71.057492][ T2090] IPv6: pim6reg1: Disabled Multicast RS [ 71.069874][ T24] audit: type=1400 audit(1763417500.690:147): avc: denied { create } for pid=2091 comm="syz.4.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 71.737252][ T2123] device veth0_vlan left promiscuous mode [ 71.761798][ T2123] device veth0_vlan entered promiscuous mode [ 72.361340][ T2150] device syzkaller0 entered promiscuous mode [ 72.684107][ T2160] device wg2 left promiscuous mode [ 72.969988][ T2177] ÿÿÿÿÿÿ: renamed from vlan1 [ 73.475787][ T24] audit: type=1400 audit(1763417503.070:148): avc: denied { attach_queue } for pid=2195 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 73.893370][ T2215] device veth1_macvtap left promiscuous mode [ 73.911401][ T24] audit: type=1400 audit(1763417503.530:149): avc: denied { create } for pid=2214 comm="syz.2.517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 74.684137][ T2259] device bridge0 entered promiscuous mode [ 75.798470][ T2315] syz.1.550[2315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.798557][ T2315] syz.1.550[2315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.186504][ T2338] device syzkaller0 entered promiscuous mode [ 76.589325][ T2369] device veth1_macvtap left promiscuous mode [ 76.638336][ T2369] device veth1_macvtap entered promiscuous mode [ 76.650735][ T2369] device macsec0 entered promiscuous mode [ 76.717974][ T2379] bridge0: port 3(ip6gretap0) entered blocking state [ 76.728410][ T2379] bridge0: port 3(ip6gretap0) entered disabled state [ 76.767760][ T2379] device ip6gretap0 entered promiscuous mode [ 76.944515][ T2397] device xfrm0 entered promiscuous mode [ 77.267576][ T24] audit: type=1400 audit(1763417506.890:150): avc: denied { create } for pid=2437 comm="syz.4.582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 77.402515][ T24] audit: type=1400 audit(1763417507.020:151): avc: denied { create } for pid=2443 comm="syz.0.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 77.427809][ T2447] sit0: mtu less than device minimum [ 77.618788][ T2456] device macsec0 left promiscuous mode [ 77.660134][ T2456] device veth1_macvtap entered promiscuous mode [ 77.704662][ T2456] device macsec0 entered promiscuous mode [ 77.753566][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 78.122300][ T2475] device pim6reg1 entered promiscuous mode [ 79.351399][ T2522] syz.0.610[2522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.351575][ T2522] syz.0.610[2522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.387895][ T2522] device pim6reg1 entered promiscuous mode [ 79.471026][ T2524] syzkaller1: tun_chr_ioctl cmd 21731 [ 79.680656][ T2531] ÿÿÿÿÿÿ: renamed from vlan1 [ 81.773406][ T2586] device syzkaller0 entered promiscuous mode [ 82.092781][ T24] audit: type=1400 audit(1763417511.710:152): avc: denied { create } for pid=2606 comm="syz.1.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 82.233416][ T2623] bridge0: port 3(dummy0) entered blocking state [ 82.256811][ T2623] bridge0: port 3(dummy0) entered disabled state [ 82.265015][ T2623] device dummy0 entered promiscuous mode [ 82.271562][ T2623] bridge0: port 3(dummy0) entered blocking state [ 82.278410][ T2623] bridge0: port 3(dummy0) entered forwarding state [ 82.992199][ T2652] device veth0_vlan left promiscuous mode [ 83.040920][ T2652] device veth0_vlan entered promiscuous mode [ 83.130453][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.158398][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.179917][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 83.295992][ T2660] bridge0: port 3(dummy0) entered disabled state [ 83.302552][ T2660] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.310365][ T2660] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.327075][ T2660] device bridge0 left promiscuous mode [ 83.435145][ T2663] device dummy0 left promiscuous mode [ 83.441780][ T2663] bridge0: port 3(dummy0) entered disabled state [ 83.450193][ T2663] device bridge_slave_1 left promiscuous mode [ 83.456857][ T2663] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.464664][ T2663] device bridge_slave_0 left promiscuous mode [ 83.474471][ T2663] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.659061][ T2667] device pim6reg1 entered promiscuous mode [ 84.127013][ T24] audit: type=1400 audit(1763417513.750:153): avc: denied { append } for pid=2691 comm="syz.1.657" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 86.260959][ T2763] device sit0 left promiscuous mode [ 86.774633][ T2783] device wg2 entered promiscuous mode [ 86.908369][ T2791] device pim6reg1 entered promiscuous mode [ 87.222108][ T2822] ªªªªªª: renamed from vlan0 [ 87.479091][ T2829] device pim6reg1 entered promiscuous mode [ 87.782537][ T2839] tap0: tun_chr_ioctl cmd 2147767521 [ 88.265409][ T2860] device wg2 left promiscuous mode [ 88.425371][ T2861] device wg2 entered promiscuous mode [ 88.956392][ T2883] device syzkaller0 entered promiscuous mode [ 89.517601][ T2910] device sit0 left promiscuous mode [ 90.751883][ T2959] device sit0 entered promiscuous mode [ 91.260911][ T2967] device syzkaller0 entered promiscuous mode [ 91.416113][ T2988] ÿÿÿÿÿÿ: renamed from vlan1 [ 91.931003][ T3030] device macsec0 left promiscuous mode [ 91.977528][ T3030] device veth1_macvtap entered promiscuous mode [ 91.987032][ T3030] device macsec0 entered promiscuous mode [ 92.023432][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.275473][ T3060] device sit0 entered promiscuous mode [ 92.856799][ T3056] device syzkaller0 entered promiscuous mode [ 95.088453][ T3126] device syzkaller0 entered promiscuous mode [ 95.343234][ T3137] syzkaller1: tun_chr_ioctl cmd 21731 [ 95.407798][ T3136] syzkaller1: tun_chr_ioctl cmd 21731 [ 95.430217][ T3142] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 95.486310][ T3137] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 96.246392][ T3165] device sit0 left promiscuous mode [ 99.424146][ T3286] device veth0_vlan left promiscuous mode [ 99.456034][ T3286] device veth0_vlan entered promiscuous mode [ 99.480044][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.506361][ T95] udevd[95]: worker [1005] terminated by signal 33 (Unknown signal 33) [ 99.514143][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.528647][ T95] udevd[95]: worker [1005] failed while handling '/devices/virtual/block/loop0' [ 99.576167][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 100.749451][ T3322] device veth1_macvtap left promiscuous mode [ 100.771215][ T3322] device macsec0 left promiscuous mode [ 103.093256][ T3385] syz.2.852[3385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.093354][ T3385] syz.2.852[3385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.826136][ T3421] device bridge_slave_1 left promiscuous mode [ 103.873284][ T3421] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.913367][ T24] audit: type=1400 audit(1763417533.530:154): avc: denied { create } for pid=3420 comm="syz.0.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 103.937728][ T3421] device bridge_slave_0 left promiscuous mode [ 103.959337][ T3421] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.125924][ T24] audit: type=1400 audit(1763417534.750:155): avc: denied { create } for pid=3458 comm="syz.4.875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 106.358663][ T3492] syz.0.885[3492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.358756][ T3492] syz.0.885[3492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.573543][ T3524] device veth0_vlan left promiscuous mode [ 107.674332][ T3524] device veth0_vlan entered promiscuous mode [ 107.682086][ T3524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.694721][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.704783][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 107.712727][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.496859][ T3624] device pim6reg1 entered promiscuous mode [ 111.284340][ T3681] device veth1_macvtap left promiscuous mode [ 111.323780][ T3681] device macsec0 left promiscuous mode [ 111.385410][ T3682] device veth1_macvtap entered promiscuous mode [ 111.395252][ T3682] device macsec0 entered promiscuous mode [ 111.412335][ T3682] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 111.454243][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.292521][ T3748] device syzkaller0 entered promiscuous mode [ 113.951676][ T3767] device wg2 left promiscuous mode [ 114.295284][ T24] audit: type=1400 audit(1763417543.920:156): avc: denied { create } for pid=3772 comm="syz.1.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 116.742952][ T3896] device veth0_vlan left promiscuous mode [ 116.764650][ T3896] device veth0_vlan entered promiscuous mode [ 116.797382][ T3896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.814614][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.825778][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 116.843867][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.964262][ T3925] ±ÿ: renamed from team_slave_1 [ 117.769376][ T3962] device syzkaller0 entered promiscuous mode [ 117.880859][ T3969] device pim6reg1 entered promiscuous mode [ 117.902110][ T3975] device pim6reg1 entered promiscuous mode [ 118.054837][ T3986] device pim6reg1 entered promiscuous mode [ 118.833609][ T4005] device pim6reg1 entered promiscuous mode [ 119.899300][ T4046] device sit0 left promiscuous mode [ 120.098434][ T4049] device veth1_macvtap left promiscuous mode [ 120.118987][ T4049] device macsec0 left promiscuous mode [ 120.144815][ T4052] device sit0 entered promiscuous mode [ 120.525390][ T4100] device sit0 left promiscuous mode [ 120.549429][ T4100] device sit0 entered promiscuous mode [ 121.388093][ T4128] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 121.442364][ T4128] device syzkaller0 entered promiscuous mode [ 122.095093][ T24] audit: type=1400 audit(1763417551.720:157): avc: denied { create } for pid=4184 comm="syz.2.1080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 122.875118][ T4213] device sit0 left promiscuous mode [ 123.040330][ T4218] device sit0 entered promiscuous mode [ 123.605594][ T4255] device wg2 entered promiscuous mode [ 124.192540][ T4301] GPL: port 1(erspan0) entered blocking state [ 124.212307][ T4301] GPL: port 1(erspan0) entered disabled state [ 124.229555][ T4301] device erspan0 entered promiscuous mode [ 124.277340][ T4307] GPL: port 1(erspan0) entered blocking state [ 124.284368][ T4307] GPL: port 1(erspan0) entered forwarding state [ 126.086704][ T4376] device macsec0 entered promiscuous mode [ 127.210777][ T4413] device pim6reg1 entered promiscuous mode [ 127.615227][ T4440] device veth1_macvtap entered promiscuous mode [ 127.644624][ T4440] device macsec0 entered promiscuous mode [ 128.287302][ T24] audit: type=1400 audit(1763417557.910:158): avc: denied { create } for pid=4471 comm="syz.2.1161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 130.071920][ T4569] device syzkaller0 entered promiscuous mode [ 130.769248][ T24] audit: type=1400 audit(1763417560.390:159): avc: denied { create } for pid=4604 comm="syz.1.1194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 131.661105][ T4638] device pim6reg1 entered promiscuous mode [ 131.837680][ T24] audit: type=1400 audit(1763417561.460:160): avc: denied { create } for pid=4644 comm="syz.2.1205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 135.812477][ T4739] device sit0 left promiscuous mode [ 136.115558][ T4755] device syzkaller0 entered promiscuous mode [ 136.251667][ T24] audit: type=1400 audit(1763417565.870:161): avc: denied { read open } for pid=4764 comm="syz.4.1237" path="net:[4026532620]" dev="nsfs" ino=4026532620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 136.265116][ T4765] device syzkaller0 entered promiscuous mode [ 136.400984][ T4765] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 136.899037][ T24] audit: type=1400 audit(1763417566.520:162): avc: denied { create } for pid=4798 comm="syz.3.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 153.796573][ T4858] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.803847][ T4858] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.811811][ T4858] device bridge_slave_0 entered promiscuous mode [ 153.819411][ T4858] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.826703][ T4858] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.834456][ T4858] device bridge_slave_1 entered promiscuous mode [ 153.841562][ T4855] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.848916][ T4855] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.857795][ T4855] device bridge_slave_0 entered promiscuous mode [ 153.868946][ T4855] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.876126][ T4855] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.883728][ T4855] device bridge_slave_1 entered promiscuous mode [ 153.945762][ T4859] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.952854][ T4859] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.960411][ T4859] device bridge_slave_0 entered promiscuous mode [ 153.969946][ T4859] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.977290][ T4859] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.985013][ T4859] device bridge_slave_1 entered promiscuous mode [ 154.006970][ T4856] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.014145][ T4856] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.021555][ T4856] device bridge_slave_0 entered promiscuous mode [ 154.028683][ T4856] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.035787][ T4856] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.043384][ T4856] device bridge_slave_1 entered promiscuous mode [ 154.073245][ T4857] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.080413][ T4857] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.087905][ T4857] device bridge_slave_0 entered promiscuous mode [ 154.094930][ T4857] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.101968][ T4857] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.109589][ T4857] device bridge_slave_1 entered promiscuous mode [ 154.219119][ T24] audit: type=1400 audit(1763417583.840:163): avc: denied { write } for pid=4856 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 154.223450][ T4856] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.247266][ T4856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.254759][ T4856] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.261974][ T4856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.269973][ T24] audit: type=1400 audit(1763417583.840:164): avc: denied { read } for pid=4856 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 154.321183][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.329164][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.336897][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.389162][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 154.398380][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.408206][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.415497][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.424381][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.433096][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.440173][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.447685][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.455953][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.487610][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.495371][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.502850][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.511546][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.520148][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.527372][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.535056][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.543419][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.553043][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.560108][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.567594][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.606534][ T49] device ip6gretap0 left promiscuous mode [ 154.612305][ T49] bridge0: port 3(ip6gretap0) entered disabled state [ 154.634698][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.642457][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.650089][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.660333][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.669631][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.678004][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.686251][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.694775][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.703146][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.710229][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.718634][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.727281][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.735561][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.742580][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.750044][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.758061][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.765938][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.774697][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.783205][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.790351][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.798056][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.806859][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.815151][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.822204][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.829639][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.837815][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.845550][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.855085][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.863270][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.882153][ T4858] device veth0_vlan entered promiscuous mode [ 154.897044][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.905384][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.912795][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.920810][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.929083][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 154.937709][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 154.946169][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.954336][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.962017][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.970089][ T4856] device veth0_vlan entered promiscuous mode [ 154.992290][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.000975][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.010894][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.018782][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.034874][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.043439][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.051770][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.060929][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.068831][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.092072][ T4858] device veth1_macvtap entered promiscuous mode [ 155.099206][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.107587][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.118290][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.127082][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.134135][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.141638][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.150295][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.159231][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.166473][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.174179][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.182199][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.190519][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.198950][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.207332][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.215952][ T4857] device veth0_vlan entered promiscuous mode [ 155.229639][ T4856] device veth1_macvtap entered promiscuous mode [ 155.240370][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.249065][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.257637][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 155.267366][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.276036][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 155.284693][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.308718][ T4859] device veth0_vlan entered promiscuous mode [ 155.318497][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.327091][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.334866][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.342425][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.350912][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.362455][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.370936][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.399219][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.407827][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.422474][ T4855] device veth0_vlan entered promiscuous mode [ 155.431987][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 155.440240][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.448699][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.456478][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.470945][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 155.479633][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.512173][ T4857] device veth1_macvtap entered promiscuous mode [ 155.519978][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.528639][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 155.537100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.546434][ T4859] device veth1_macvtap entered promiscuous mode [ 155.578275][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.593198][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 155.606123][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.797413][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.811638][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.842446][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.874961][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.904693][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.934070][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.952906][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.961662][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.980822][ T4855] device veth1_macvtap entered promiscuous mode [ 156.025936][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 156.038262][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.060732][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.093748][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.112305][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.133115][ T49] GPL: port 1(erspan0) entered disabled state [ 156.161587][ T49] device erspan0 left promiscuous mode [ 156.169650][ T49] GPL: port 1(erspan0) entered disabled state [ 156.307178][ T4897] device sit0 entered promiscuous mode [ 156.892943][ T49] device bridge_slave_1 left promiscuous mode [ 156.904842][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.913087][ T49] device bridge_slave_0 left promiscuous mode [ 156.919822][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.949729][ T49] device bridge_slave_1 left promiscuous mode [ 156.978178][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.019368][ T49] device bridge_slave_0 left promiscuous mode [ 157.055709][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.085255][ T49] device bridge_slave_1 left promiscuous mode [ 157.091743][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.099732][ T49] device bridge_slave_0 left promiscuous mode [ 157.106178][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.124072][ T49] device veth1_macvtap left promiscuous mode [ 157.141469][ T49] device veth0_vlan left promiscuous mode [ 157.150585][ T49] device veth1_macvtap left promiscuous mode [ 157.158056][ T49] device veth1_macvtap left promiscuous mode [ 157.165450][ T49] device veth0_vlan left promiscuous mode [ 158.348517][ T4946] device sit0 left promiscuous mode [ 158.631817][ T4951] device sit0 entered promiscuous mode [ 159.171549][ T4980] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.180473][ T4980] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.261595][ T4981] device bridge_slave_1 left promiscuous mode [ 159.269050][ T4981] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.284543][ T4981] device bridge_slave_0 left promiscuous mode [ 159.295349][ T4981] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.344471][ T24] audit: type=1400 audit(1763417589.960:165): avc: denied { ioctl } for pid=4994 comm="syz.6.1295" path="net:[4026532999]" dev="nsfs" ino=4026532999 ioctlcmd=0x54dc scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 162.550197][ T5060] device syzkaller0 entered promiscuous mode [ 162.864459][ T5075] device sit0 entered promiscuous mode [ 164.031803][ T5121] device sit0 entered promiscuous mode [ 165.045180][ T5134] device syzkaller0 entered promiscuous mode [ 167.581979][ T5218] syz.8.1352[5218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.582083][ T5218] syz.8.1352[5218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.117256][ T5239] device syzkaller0 entered promiscuous mode [ 170.144145][ T5268] device pim6reg1 entered promiscuous mode [ 170.230986][ T5278] device wg2 entered promiscuous mode [ 170.314106][ T5281] ÿÿ: renamed from bond_slave_0 [ 175.819126][ T5503] device veth0_vlan left promiscuous mode [ 175.843294][ T5503] device veth0_vlan entered promiscuous mode [ 175.914214][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.944728][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.952672][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.730388][ T5543] device pim6reg1 entered promiscuous mode [ 177.459770][ T5608] device syzkaller0 entered promiscuous mode [ 179.008890][ T5695] device sit0 entered promiscuous mode [ 181.430785][ T5759] device syzkaller0 entered promiscuous mode [ 183.596141][ T5856] device pim6reg1 entered promiscuous mode [ 184.469785][ T5901] device syzkaller0 entered promiscuous mode [ 184.504160][ T5898] device veth0_vlan left promiscuous mode [ 184.513139][ T5898] device veth0_vlan entered promiscuous mode [ 184.605566][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.631335][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.675379][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.723504][ T5987] device syzkaller0 entered promiscuous mode [ 187.498933][ T6035] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.847451][ T6058] device veth0_vlan left promiscuous mode [ 187.922141][ T6058] device veth0_vlan entered promiscuous mode [ 188.042328][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.070828][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.120939][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.471808][ T6117] device sit0 entered promiscuous mode [ 193.879781][ T6224] device sit0 left promiscuous mode [ 194.102792][ T6241] device syzkaller0 entered promiscuous mode [ 194.958912][ T6284] device veth0_vlan left promiscuous mode [ 194.972466][ T6284] device veth0_vlan entered promiscuous mode [ 195.014758][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.026194][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.038886][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 195.326530][ T6309] device veth0_vlan left promiscuous mode [ 195.414610][ T6309] device veth0_vlan entered promiscuous mode [ 195.447699][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.474941][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.495715][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 195.530680][ T6310] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.539428][ T6310] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.079867][ T6404] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.087140][ T6404] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.026841][ T24] audit: type=1400 audit(1763417627.650:166): avc: denied { create } for pid=6430 comm="syz.9.1689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 198.574538][ T6475] device sit0 left promiscuous mode [ 198.630188][ T6479] device sit0 entered promiscuous mode [ 199.580171][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 199.746910][ T6518] device syzkaller0 entered promiscuous mode [ 200.194580][ T6532] cgroup: fork rejected by pids controller in /syz9 [ 201.201100][ T6568] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.238061][ T6568] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.274373][ T6568] device bridge_slave_0 entered promiscuous mode [ 201.314647][ T6568] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.349493][ T6568] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.384565][ T6568] device bridge_slave_1 entered promiscuous mode [ 201.509197][ T6568] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.516313][ T6568] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.523620][ T6568] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.530688][ T6568] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.887664][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.903645][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.040244][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.068111][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.188809][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.214919][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.299002][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.306209][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.469671][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.501834][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.550524][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.557612][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.683229][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.710057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.748583][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.789041][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.854005][ T6622] device syzkaller0 entered promiscuous mode [ 202.920701][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.934331][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.982235][ T6568] device veth0_vlan entered promiscuous mode [ 203.049961][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.070159][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.115082][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.161302][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.224546][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.248959][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.323173][ T6568] device veth1_macvtap entered promiscuous mode [ 203.412559][ T24] audit: type=1400 audit(1763417633.030:167): avc: denied { create } for pid=6652 comm="syz.8.1750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 203.416734][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.450416][ T6654] syz.8.1750[6654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.450511][ T6654] syz.8.1750[6654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.482674][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.524567][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.795332][ T6653] device veth1_macvtap left promiscuous mode [ 203.831602][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.844325][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.905562][ T6319] device bridge_slave_1 left promiscuous mode [ 203.912915][ T6319] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.929373][ T6319] device bridge_slave_0 left promiscuous mode [ 203.935807][ T6319] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.947075][ T6319] device veth1_macvtap left promiscuous mode [ 204.263567][ T6668] device sit0 left promiscuous mode [ 204.312634][ T6671] device sit0 entered promiscuous mode [ 205.632043][ T6731] device sit0 left promiscuous mode [ 205.769428][ T6735] device sit0 entered promiscuous mode [ 206.022650][ T6750] device sit0 left promiscuous mode [ 206.546379][ T6754] device syzkaller0 entered promiscuous mode [ 206.572404][ T6761] device sit0 entered promiscuous mode [ 206.948357][ T6794] device veth0_vlan left promiscuous mode [ 207.010179][ T6794] device veth0_vlan entered promiscuous mode [ 207.452992][ T6836] device pim6reg1 entered promiscuous mode [ 210.860038][ T6992] device wg2 entered promiscuous mode [ 211.124498][ T7010] device sit0 left promiscuous mode [ 211.244528][ T7010] device sit0 entered promiscuous mode [ 214.533250][ T7158] device veth1_macvtap left promiscuous mode [ 215.146547][ T7186] device veth0_vlan left promiscuous mode [ 215.169097][ T7186] device veth0_vlan entered promiscuous mode [ 215.227681][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.251125][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.305036][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.318361][ T24] audit: type=1400 audit(1763417644.940:168): avc: denied { create } for pid=7195 comm="syz.6.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 215.891665][ T7234] device syzkaller0 entered promiscuous mode [ 216.057293][ T7242] device veth0_vlan left promiscuous mode [ 216.075538][ T7242] device veth0_vlan entered promiscuous mode [ 216.312370][ T7252] device sit0 entered promiscuous mode [ 216.665846][ T7255] device wg2 left promiscuous mode [ 219.519885][ T7438] device pim6reg1 entered promiscuous mode [ 219.542042][ T7437] syz.6.1964[7437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.545132][ T7437] syz.6.1964[7437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.685141][ T7444] device sit0 left promiscuous mode [ 220.066836][ T7463] device sit0 left promiscuous mode [ 220.838143][ T7522] device syzkaller0 entered promiscuous mode [ 221.845195][ T7563] device wg2 left promiscuous mode [ 222.022919][ T7563] device veth1_to_team entered promiscuous mode [ 222.184721][ T7577] device veth0_vlan left promiscuous mode [ 222.203954][ T7577] device veth0_vlan entered promiscuous mode [ 222.816798][ T7600] device veth0_vlan left promiscuous mode [ 222.824448][ T7600] device veth0_vlan entered promiscuous mode [ 223.186325][ T7627] device veth1_macvtap left promiscuous mode [ 223.198897][ T7627] device veth1_macvtap entered promiscuous mode [ 223.221773][ T7627] device macsec0 entered promiscuous mode [ 223.245098][ T7627] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.271528][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.410074][ T7631] device syzkaller0 entered promiscuous mode [ 224.202175][ T7653] device sit0 left promiscuous mode [ 224.280263][ T7653] device sit0 entered promiscuous mode [ 225.396150][ T7711] syz.8.2044[7711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.396220][ T7711] syz.8.2044[7711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.615423][ T7735] device sit0 left promiscuous mode [ 225.733071][ T7738] device sit0 entered promiscuous mode [ 226.586690][ T7791] device veth0_vlan left promiscuous mode [ 226.615714][ T7791] device veth0_vlan entered promiscuous mode [ 227.078115][ T7809] device syzkaller0 entered promiscuous mode [ 228.626045][ T7827] device syzkaller0 entered promiscuous mode [ 230.285455][ T24] audit: type=1400 audit(1763417659.910:169): avc: denied { associate } for pid=7856 comm="syz.5.2084" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 231.483930][ T7903] device syzkaller0 entered promiscuous mode [ 231.694698][ T7913] device wg2 entered promiscuous mode [ 231.707445][ T7911] device pim6reg1 entered promiscuous mode [ 232.035904][ T7927] device syzkaller0 entered promiscuous mode [ 232.320486][ T7936] device syzkaller0 entered promiscuous mode [ 234.187883][ T8002] device syzkaller0 entered promiscuous mode [ 234.805409][ T24] audit: type=1400 audit(1763417664.430:170): avc: denied { create } for pid=8027 comm="syz.5.2128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 235.967872][ T8076] cgroup: fork rejected by pids controller in /syz8 [ 236.704024][ T24] audit: type=1400 audit(1763417666.330:171): avc: denied { mounton } for pid=8106 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 236.891288][ T8106] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.938442][ T8106] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.985861][ T8106] device bridge_slave_0 entered promiscuous mode [ 237.061278][ T8106] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.093873][ T8106] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.104565][ T8106] device bridge_slave_1 entered promiscuous mode [ 237.114665][ T8126] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.121957][ T8126] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.134236][ T6319] device bridge_slave_1 left promiscuous mode [ 237.141346][ T6319] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.149228][ T6319] device bridge_slave_0 left promiscuous mode [ 237.156494][ T6319] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.375159][ T8138] syz.7.2161[8138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.375240][ T8138] syz.7.2161[8138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.532869][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.566015][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.613356][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.624409][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.633631][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.640701][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.650362][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.659195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.671351][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.678552][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.686415][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.694653][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.702849][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.731491][ T8160] device syzkaller0 entered promiscuous mode [ 237.806826][ T8168] device syzkaller0 entered promiscuous mode [ 237.815961][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.850124][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.861729][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.871213][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.901942][ T8106] device veth0_vlan entered promiscuous mode [ 237.929360][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.939973][ T8106] device veth1_macvtap entered promiscuous mode [ 237.975437][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.999966][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.027770][ T24] audit: type=1400 audit(1763417667.650:172): avc: denied { unmount } for pid=8106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 239.648160][ T8275] device pim6reg1 entered promiscuous mode [ 240.194473][ T8297] device sit0 left promiscuous mode [ 240.309241][ T8298] device sit0 entered promiscuous mode [ 241.325649][ T8328] device sit0 left promiscuous mode [ 241.439460][ T8329] device sit0 entered promiscuous mode [ 241.731525][ T8338] device syzkaller0 entered promiscuous mode [ 244.077874][ T8449] device veth0_vlan left promiscuous mode [ 244.095157][ T8449] device veth0_vlan entered promiscuous mode [ 244.120078][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.130943][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.159771][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.895218][ T8496] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.902504][ T8496] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.173992][ T8510] device pim6reg1 entered promiscuous mode [ 245.284007][ T8496] device wg2 entered promiscuous mode [ 246.012607][ T8541] device pim6reg1 entered promiscuous mode [ 246.034881][ T8545] device sit0 left promiscuous mode [ 246.083946][ T8545] device sit0 entered promiscuous mode [ 246.396855][ T8570] device syzkaller0 entered promiscuous mode [ 246.870014][ T8595] device syzkaller0 entered promiscuous mode [ 247.597679][ T8649] device veth0_vlan left promiscuous mode [ 247.625057][ T8649] device veth0_vlan entered promiscuous mode [ 248.075746][ T8696] device wg2 left promiscuous mode [ 248.155459][ T8699] device wg2 entered promiscuous mode [ 249.292279][ T8715] device pim6reg1 entered promiscuous mode [ 250.169403][ T8760] device wg2 entered promiscuous mode [ 250.948924][ T8790] device veth1_macvtap left promiscuous mode [ 251.029255][ T8791] @ÿaaaaaaaaa: renamed from bond_slave_0 [ 253.597172][ T8916] device syzkaller0 entered promiscuous mode [ 254.857341][ T8962] device pim6reg1 entered promiscuous mode [ 255.971963][ T9012] device pim6reg1 entered promiscuous mode [ 255.981099][ T9012] syz.8.2412[9012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.981441][ T9012] syz.8.2412[9012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.431187][ T9028] device veth0_vlan left promiscuous mode [ 256.465195][ T9028] device veth0_vlan entered promiscuous mode [ 256.491154][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.510758][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.529074][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.531605][ T9054] device syzkaller0 entered promiscuous mode [ 257.634126][ T9071] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.641310][ T9071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.648721][ T9071] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.655874][ T9071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.745437][ T9071] device bridge0 entered promiscuous mode [ 257.893952][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.283608][ T9166] device wg2 left promiscuous mode [ 262.374140][ T9196] device veth0_vlan left promiscuous mode [ 262.404287][ T9196] device veth0_vlan entered promiscuous mode [ 262.411645][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.425788][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.441973][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.498439][ T9212] device sit0 left promiscuous mode [ 262.527723][ T9212] device sit0 entered promiscuous mode [ 263.751005][ T9262] device syzkaller0 entered promiscuous mode [ 264.064847][ T9276] device syzkaller0 entered promiscuous mode [ 267.349848][ T9396] device sit0 entered promiscuous mode [ 267.651248][ T9407] device pim6reg1 entered promiscuous mode [ 268.553052][ T9470] device syzkaller0 entered promiscuous mode [ 269.365262][ T9516] device syzkaller0 entered promiscuous mode [ 269.425561][ T9527] device sit0 left promiscuous mode [ 269.462867][ T9532] device sit0 entered promiscuous mode [ 270.904720][ T9593] device syzkaller0 entered promiscuous mode [ 271.188472][ T9609] syz.6.2581[9609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.188552][ T9609] syz.6.2581[9609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.325248][ T9596] device sit0 left promiscuous mode [ 271.768326][ T9644] syz.6.2590[9644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.768407][ T9644] syz.6.2590[9644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.858463][ T9638] device syzkaller0 entered promiscuous mode [ 272.707190][ T9677] device syzkaller0 entered promiscuous mode [ 272.979796][ T9685] device syzkaller0 entered promiscuous mode [ 276.768512][ T9875] device syzkaller0 entered promiscuous mode [ 278.289862][ T9918] device veth1_macvtap left promiscuous mode [ 278.771158][ T9927] device syzkaller0 entered promiscuous mode [ 280.745068][T10008] device syzkaller0 entered promiscuous mode [ 282.326688][T10076] device wg2 left promiscuous mode [ 282.335363][T10076] device wg2 entered promiscuous mode [ 282.455877][T10085] device wg2 left promiscuous mode [ 282.873055][T10109] syz.8.2723[10109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.873149][T10109] syz.8.2723[10109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.303949][T10123] device syzkaller0 entered promiscuous mode [ 283.714661][T10144] device syzkaller0 entered promiscuous mode [ 286.391741][T10188] device veth0_vlan left promiscuous mode [ 286.446101][T10188] device veth0_vlan entered promiscuous mode [ 286.509477][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.533195][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.572099][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.871856][T10195] device syzkaller0 entered promiscuous mode [ 289.214978][T10310] device syzkaller0 entered promiscuous mode [ 289.321938][T10314] device syzkaller0 entered promiscuous mode [ 290.224262][T10388] 7B’ç÷ï: renamed from syzkaller0 [ 292.051373][T10507] device wg2 entered promiscuous mode [ 292.326123][T10526] syz.9.2836[10526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.326171][T10526] syz.9.2836[10526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.966331][T10570] device syzkaller0 entered promiscuous mode [ 293.567418][T10590] -1: renamed from syzkaller0 [ 293.713002][T10614] syz.7.2865[10614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.713099][T10614] syz.7.2865[10614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.475407][T10660] device veth0_vlan left promiscuous mode [ 294.552340][T10660] device veth0_vlan entered promiscuous mode [ 294.722607][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.739664][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.807767][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.866491][T10925] device sit0 left promiscuous mode [ 297.928492][T10927] device sit0 entered promiscuous mode [ 298.172512][T10917] device veth0_to_team entered promiscuous mode [ 300.081686][T11015] device syzkaller0 entered promiscuous mode [ 304.122549][T11202] syz.9.3031[11202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.122611][T11202] syz.9.3031[11202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.195141][T11209] device sit0 left promiscuous mode [ 304.328760][T11213] device sit0 entered promiscuous mode [ 305.092462][T11280] syz.8.3052[11280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.092521][T11280] syz.8.3052[11280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.297380][T11369] device sit0 entered promiscuous mode [ 306.627872][T11366] device syzkaller0 entered promiscuous mode [ 308.425859][T11412] device syzkaller0 entered promiscuous mode [ 308.560217][T11422] device veth0_vlan left promiscuous mode [ 308.575517][T11422] device veth0_vlan entered promiscuous mode [ 309.377725][T11475] device sit0 left promiscuous mode [ 309.446408][T11485] device pim6reg1 entered promiscuous mode [ 309.752886][T11507] device pim6reg1 entered promiscuous mode [ 310.476204][T11545] device pim6reg1 entered promiscuous mode [ 310.656329][T11555] device pim6reg1 entered promiscuous mode [ 311.192219][T11585] device veth0_vlan left promiscuous mode [ 311.274427][T11585] device veth0_vlan entered promiscuous mode [ 311.283849][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.292017][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.348432][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.849446][T11635] device pim6reg1 entered promiscuous mode [ 311.983114][T11645] device wg2 left promiscuous mode [ 312.045758][T11646] device veth1_to_team entered promiscuous mode [ 313.351266][T11717] device syzkaller0 entered promiscuous mode [ 313.606501][T11738] device syzkaller0 entered promiscuous mode [ 314.128762][T11779] device syzkaller0 entered promiscuous mode [ 316.620240][T11914] device syzkaller0 entered promiscuous mode [ 316.970517][T11927] device sit0 entered promiscuous mode [ 317.055335][T11939] device vlan0 entered promiscuous mode [ 317.074747][T11942] device macsec0 entered promiscuous mode [ 318.818169][T12012] device sit0 left promiscuous mode [ 319.620223][T12052] device pim6reg1 entered promiscuous mode [ 322.048284][T12139] device pim6reg1 left promiscuous mode [ 322.645758][T12168] device wg2 left promiscuous mode [ 322.728636][T12168] device wg2 entered promiscuous mode [ 322.903671][T12178] device pim6reg1 entered promiscuous mode [ 323.023204][T12191] device syzkaller0 entered promiscuous mode [ 323.178166][T12206] device macsec0 entered promiscuous mode [ 323.185524][T12206] device veth1_macvtap entered promiscuous mode [ 323.565197][T12233] device xfrm0 entered promiscuous mode [ 324.419711][T12293] device veth1_macvtap left promiscuous mode [ 324.438001][T12293] device macsec0 left promiscuous mode [ 325.747526][T12357] Q±6ã`Ò˜: renamed from lo [ 326.934705][T12401] device veth1_macvtap left promiscuous mode [ 326.940843][T12401] device macsec0 left promiscuous mode [ 327.404304][T12428] bridge0: port 3(gretap0) entered blocking state [ 327.473305][T12428] bridge0: port 3(gretap0) entered disabled state [ 327.489724][T12428] device gretap0 entered promiscuous mode [ 327.495741][T12428] bridge0: port 3(gretap0) entered blocking state [ 327.502206][T12428] bridge0: port 3(gretap0) entered forwarding state [ 328.504561][T12463] device pim6reg1 entered promiscuous mode [ 329.133718][T12507] device sit0 entered promiscuous mode [ 329.215867][T12513] device wg2 entered promiscuous mode [ 329.828054][T12556] device syzkaller0 entered promiscuous mode [ 329.945172][T12568] device pim6reg1 entered promiscuous mode [ 331.390003][T12614] device syzkaller0 entered promiscuous mode [ 331.444082][T12629] device wg2 entered promiscuous mode [ 332.884571][T12719] device veth1_macvtap left promiscuous mode [ 332.891559][T12719] device macsec0 left promiscuous mode [ 332.950573][T12719] device macsec0 entered promiscuous mode [ 332.965556][T12719] device veth1_macvtap entered promiscuous mode [ 333.712202][T12751] device syzkaller0 entered promiscuous mode [ 334.290511][T12790] device sit0 left promiscuous mode [ 335.052190][T12826] device wg2 left promiscuous mode [ 337.140342][T12951] device syzkaller0 entered promiscuous mode [ 337.885302][T12984] device syzkaller0 entered promiscuous mode [ 338.788354][T13024] device syzkaller0 entered promiscuous mode [ 339.521884][T13057] device syzkaller0 entered promiscuous mode [ 342.412645][T13107] device syzkaller0 entered promiscuous mode [ 342.432869][T13110] device syzkaller0 entered promiscuous mode [ 342.629121][T13116] device syzkaller0 entered promiscuous mode [ 342.823180][T13132] device sit0 left promiscuous mode [ 343.469498][T13151] device sit0 entered promiscuous mode [ 343.870357][T13184] device veth0_vlan left promiscuous mode [ 343.883632][T13184] device veth0_vlan entered promiscuous mode [ 343.951204][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.986014][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.014068][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 345.411040][T13247] device syzkaller0 entered promiscuous mode [ 345.661331][T13271] device sit0 entered promiscuous mode [ 346.078292][T13279] device pim6reg1 left promiscuous mode [ 348.887602][T13410] device syzkaller0 entered promiscuous mode [ 349.534416][ T24] audit: type=1400 audit(1763417779.150:173): avc: denied { create } for pid=13424 comm="syz.5.3664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 349.925757][T13451] device wg2 entered promiscuous mode [ 351.694612][T13536] device syzkaller0 entered promiscuous mode [ 352.130156][T13556] GPL: port 1(erspan0) entered blocking state [ 352.136499][T13556] GPL: port 1(erspan0) entered disabled state [ 352.154882][T13556] device erspan0 entered promiscuous mode [ 352.174096][T13556] GPL: port 1(erspan0) entered blocking state [ 352.180440][T13556] GPL: port 1(erspan0) entered forwarding state [ 352.741181][T13602] device wg2 left promiscuous mode [ 352.785506][T13602] device wg2 entered promiscuous mode [ 352.792027][T13602] device pim6reg1 entered promiscuous mode [ 353.610303][T13625] device syzkaller0 entered promiscuous mode [ 354.504217][T13679] device syzkaller0 entered promiscuous mode [ 354.708550][T13689] device sit0 entered promiscuous mode [ 354.965061][T13696] device pim6reg1 entered promiscuous mode [ 355.246588][T13735] device wg2 left promiscuous mode [ 357.158550][T13836] device pim6reg1 entered promiscuous mode [ 357.576605][T13842] device syzkaller0 entered promiscuous mode [ 357.909136][T13867] device syzkaller0 entered promiscuous mode [ 358.686616][T13924] device syzkaller0 entered promiscuous mode [ 358.716500][T13933] device pim6reg1 entered promiscuous mode [ 359.156599][T13947] device pim6reg1 entered promiscuous mode [ 359.489643][T13968] device sit0 left promiscuous mode [ 359.588808][T13974] device sit0 entered promiscuous mode [ 360.076814][T13996] device veth0_vlan left promiscuous mode [ 360.086793][T13996] device veth0_vlan entered promiscuous mode [ 360.123434][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.144361][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 360.168930][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 360.934198][T14023] device bridge_slave_1 left promiscuous mode [ 360.942507][T14023] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.965612][T14023] device bridge_slave_0 left promiscuous mode [ 360.984087][T14023] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.316106][T14041] bridge0: port 3(gretap0) entered blocking state [ 361.335478][T14041] bridge0: port 3(gretap0) entered disabled state [ 361.369961][T14041] device gretap0 entered promiscuous mode [ 361.412971][T14041] bridge0: port 3(gretap0) entered blocking state [ 361.419489][T14041] bridge0: port 3(gretap0) entered forwarding state [ 361.515494][T14056] device sit0 left promiscuous mode [ 361.545565][T14056] device sit0 entered promiscuous mode [ 361.555565][T14057] FAULT_INJECTION: forcing a failure. [ 361.555565][T14057] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 361.583876][T14057] CPU: 0 PID: 14057 Comm: syz.8.3840 Tainted: G W syzkaller #0 [ 361.592883][T14057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 361.603045][T14057] Call Trace: [ 361.606364][T14057] __dump_stack+0x21/0x24 [ 361.610707][T14057] dump_stack_lvl+0x169/0x1d8 [ 361.615395][T14057] ? show_regs_print_info+0x18/0x18 [ 361.620609][T14057] dump_stack+0x15/0x1c [ 361.624945][T14057] should_fail+0x3c1/0x510 [ 361.629373][T14057] should_fail_usercopy+0x1a/0x20 [ 361.634496][T14057] copy_page_from_iter+0x381/0x6c0 [ 361.639623][T14057] pipe_write+0x914/0x1890 [ 361.644055][T14057] ? pipe_write+0x151/0x1890 [ 361.648650][T14057] ? pipe_read+0xfe0/0xfe0 [ 361.653088][T14057] ? fsnotify_perm+0x66/0x4b0 [ 361.657785][T14057] ? security_file_permission+0x83/0xa0 [ 361.663433][T14057] ? iov_iter_init+0x3f/0x120 [ 361.668131][T14057] vfs_write+0x725/0xd60 [ 361.672381][T14057] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 361.678190][T14057] ? kernel_write+0x3c0/0x3c0 [ 361.682876][T14057] ? __fget_files+0x2c4/0x320 [ 361.687573][T14057] ? __fdget_pos+0x1f7/0x380 [ 361.692172][T14057] ? ksys_write+0x71/0x240 [ 361.696691][T14057] ksys_write+0x140/0x240 [ 361.701030][T14057] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 361.707191][T14057] ? __ia32_sys_read+0x90/0x90 [ 361.711959][T14057] ? ksys_write+0x8/0x240 [ 361.716379][T14057] __x64_sys_write+0x7b/0x90 [ 361.721058][T14057] do_syscall_64+0x31/0x40 [ 361.725484][T14057] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 361.731382][T14057] RIP: 0033:0x7ffb69e176c9 [ 361.735818][T14057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 361.755524][T14057] RSP: 002b:00007ffb6887f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.763949][T14057] RAX: ffffffffffffffda RBX: 00007ffb6a06dfa0 RCX: 00007ffb69e176c9 [ 361.771923][T14057] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 361.779901][T14057] RBP: 00007ffb6887f090 R08: 0000000000000000 R09: 0000000000000000 [ 361.787874][T14057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.795856][T14057] R13: 00007ffb6a06e038 R14: 00007ffb6a06dfa0 R15: 00007ffc68186a88 [ 362.817944][T14097] FAULT_INJECTION: forcing a failure. [ 362.817944][T14097] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 362.832008][T14097] CPU: 0 PID: 14097 Comm: syz.5.3855 Tainted: G W syzkaller #0 [ 362.840879][T14097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 362.850950][T14097] Call Trace: [ 362.854254][T14097] __dump_stack+0x21/0x24 [ 362.858595][T14097] dump_stack_lvl+0x169/0x1d8 [ 362.863281][T14097] ? show_regs_print_info+0x18/0x18 [ 362.868504][T14097] ? do_kern_addr_fault+0x80/0x80 [ 362.873550][T14097] dump_stack+0x15/0x1c [ 362.877713][T14097] should_fail+0x3c1/0x510 [ 362.882138][T14097] should_fail_alloc_page+0x4f/0x60 [ 362.887441][T14097] __alloc_pages_nodemask+0x109/0x5f0 [ 362.892827][T14097] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 362.898395][T14097] ? copy_user_enhanced_fast_string+0xe/0x40 [ 362.904388][T14097] pipe_write+0x570/0x1890 [ 362.908812][T14097] ? pipe_write+0x151/0x1890 [ 362.913417][T14097] ? pipe_read+0xfe0/0xfe0 [ 362.917849][T14097] ? fsnotify_perm+0x66/0x4b0 [ 362.922538][T14097] ? security_file_permission+0x83/0xa0 [ 362.928097][T14097] ? iov_iter_init+0x3f/0x120 [ 362.932784][T14097] vfs_write+0x725/0xd60 [ 362.937038][T14097] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 362.942852][T14097] ? kernel_write+0x3c0/0x3c0 [ 362.947623][T14097] ? __fget_files+0x2c4/0x320 [ 362.952312][T14097] ? __fdget_pos+0x1f7/0x380 [ 362.956931][T14097] ? ksys_write+0x71/0x240 [ 362.961362][T14097] ksys_write+0x140/0x240 [ 362.965702][T14097] ? __ia32_sys_read+0x90/0x90 [ 362.970562][T14097] ? debug_smp_processor_id+0x17/0x20 [ 362.976044][T14097] __x64_sys_write+0x7b/0x90 [ 362.980656][T14097] do_syscall_64+0x31/0x40 [ 362.985085][T14097] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 362.990990][T14097] RIP: 0033:0x7f31c7f446c9 [ 362.995415][T14097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 363.015028][T14097] RSP: 002b:00007f31c69ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 363.023457][T14097] RAX: ffffffffffffffda RBX: 00007f31c819afa0 RCX: 00007f31c7f446c9 [ 363.031465][T14097] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 363.039454][T14097] RBP: 00007f31c69ac090 R08: 0000000000000000 R09: 0000000000000000 [ 363.047432][T14097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.055411][T14097] R13: 00007f31c819b038 R14: 00007f31c819afa0 R15: 00007ffe1185e1e8 [ 363.219316][T14108] device pim6reg1 entered promiscuous mode [ 363.471568][T14117] device syzkaller0 entered promiscuous mode [ 364.067251][T14140] FAULT_INJECTION: forcing a failure. [ 364.067251][T14140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 364.080829][T14140] CPU: 1 PID: 14140 Comm: syz.6.3869 Tainted: G W syzkaller #0 [ 364.089693][T14140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 364.099760][T14140] Call Trace: [ 364.103070][T14140] __dump_stack+0x21/0x24 [ 364.107412][T14140] dump_stack_lvl+0x169/0x1d8 [ 364.112097][T14140] ? show_regs_print_info+0x18/0x18 [ 364.117294][T14140] dump_stack+0x15/0x1c [ 364.121442][T14140] should_fail+0x3c1/0x510 [ 364.125885][T14140] should_fail_usercopy+0x1a/0x20 [ 364.130900][T14140] copy_page_from_iter+0x381/0x6c0 [ 364.136007][T14140] pipe_write+0x914/0x1890 [ 364.140420][T14140] ? pipe_write+0x151/0x1890 [ 364.145004][T14140] ? pipe_read+0xfe0/0xfe0 [ 364.149420][T14140] ? fsnotify_perm+0x66/0x4b0 [ 364.154108][T14140] ? security_file_permission+0x83/0xa0 [ 364.159644][T14140] ? iov_iter_init+0x3f/0x120 [ 364.164328][T14140] vfs_write+0x725/0xd60 [ 364.168574][T14140] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 364.174369][T14140] ? kernel_write+0x3c0/0x3c0 [ 364.179051][T14140] ? __fget_files+0x148/0x320 [ 364.183735][T14140] ? __fget_files+0x2c4/0x320 [ 364.188402][T14140] ? __fdget_pos+0x1f7/0x380 [ 364.193098][T14140] ? ksys_write+0x71/0x240 [ 364.197522][T14140] ksys_write+0x140/0x240 [ 364.201874][T14140] ? __ia32_sys_read+0x90/0x90 [ 364.206643][T14140] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 364.212709][T14140] ? debug_smp_processor_id+0x17/0x20 [ 364.218077][T14140] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 364.224227][T14140] __x64_sys_write+0x7b/0x90 [ 364.228821][T14140] do_syscall_64+0x31/0x40 [ 364.233231][T14140] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 364.239114][T14140] RIP: 0033:0x7fa3dccd26c9 [ 364.243612][T14140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.263234][T14140] RSP: 002b:00007fa3db73a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 364.271640][T14140] RAX: ffffffffffffffda RBX: 00007fa3dcf28fa0 RCX: 00007fa3dccd26c9 [ 364.279599][T14140] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 364.287649][T14140] RBP: 00007fa3db73a090 R08: 0000000000000000 R09: 0000000000000000 [ 364.295609][T14140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.303569][T14140] R13: 00007fa3dcf29038 R14: 00007fa3dcf28fa0 R15: 00007ffd06c55c08 [ 364.695749][T14144] device syzkaller0 entered promiscuous mode [ 365.029161][T14176] device wg2 left promiscuous mode [ 365.124003][T14179] FAULT_INJECTION: forcing a failure. [ 365.124003][T14179] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 365.164511][T14181] device wg2 entered promiscuous mode [ 365.183941][T14179] CPU: 0 PID: 14179 Comm: syz.5.3881 Tainted: G W syzkaller #0 [ 365.192829][T14179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 365.202923][T14179] Call Trace: [ 365.206227][T14179] __dump_stack+0x21/0x24 [ 365.210646][T14179] dump_stack_lvl+0x169/0x1d8 [ 365.215325][T14179] ? show_regs_print_info+0x18/0x18 [ 365.220533][T14179] dump_stack+0x15/0x1c [ 365.224696][T14179] should_fail+0x3c1/0x510 [ 365.229122][T14179] should_fail_alloc_page+0x4f/0x60 [ 365.234320][T14179] __alloc_pages_nodemask+0x109/0x5f0 [ 365.239696][T14179] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 365.245262][T14179] ? copy_user_enhanced_fast_string+0xe/0x40 [ 365.251249][T14179] pipe_write+0x570/0x1890 [ 365.255665][T14179] ? pipe_write+0x151/0x1890 [ 365.260259][T14179] ? pipe_read+0xfe0/0xfe0 [ 365.264694][T14179] ? fsnotify_perm+0x66/0x4b0 [ 365.269385][T14179] ? security_file_permission+0x83/0xa0 [ 365.274933][T14179] ? iov_iter_init+0x3f/0x120 [ 365.279611][T14179] vfs_write+0x725/0xd60 [ 365.283858][T14179] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 365.289691][T14179] ? kernel_write+0x3c0/0x3c0 [ 365.294369][T14179] ? __fget_files+0x2c4/0x320 [ 365.299071][T14179] ? __fdget_pos+0x1f7/0x380 [ 365.303664][T14179] ? ksys_write+0x71/0x240 [ 365.308081][T14179] ksys_write+0x140/0x240 [ 365.312425][T14179] ? __ia32_sys_read+0x90/0x90 [ 365.317192][T14179] ? debug_smp_processor_id+0x17/0x20 [ 365.322570][T14179] __x64_sys_write+0x7b/0x90 [ 365.327160][T14179] do_syscall_64+0x31/0x40 [ 365.331581][T14179] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 365.337474][T14179] RIP: 0033:0x7f31c7f446c9 [ 365.341905][T14179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.361522][T14179] RSP: 002b:00007f31c69ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 365.369944][T14179] RAX: ffffffffffffffda RBX: 00007f31c819afa0 RCX: 00007f31c7f446c9 [ 365.377916][T14179] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 365.385896][T14179] RBP: 00007f31c69ac090 R08: 0000000000000000 R09: 0000000000000000 [ 365.393890][T14179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.401868][T14179] R13: 00007f31c819b038 R14: 00007f31c819afa0 R15: 00007ffe1185e1e8 [ 365.999828][T14218] device pim6reg1 left promiscuous mode [ 366.305703][T14224] device pim6reg1 entered promiscuous mode [ 366.712545][T14231] FAULT_INJECTION: forcing a failure. [ 366.712545][T14231] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 366.727558][T14231] CPU: 0 PID: 14231 Comm: syz.6.3893 Tainted: G W syzkaller #0 [ 366.736433][T14231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 366.746499][T14231] Call Trace: [ 366.749816][T14231] __dump_stack+0x21/0x24 [ 366.754161][T14231] dump_stack_lvl+0x169/0x1d8 [ 366.758856][T14231] ? show_regs_print_info+0x18/0x18 [ 366.764070][T14231] ? sched_clock+0x3a/0x40 [ 366.768511][T14231] dump_stack+0x15/0x1c [ 366.772685][T14231] should_fail+0x3c1/0x510 [ 366.777112][T14231] should_fail_usercopy+0x1a/0x20 [ 366.782142][T14231] copy_page_from_iter+0x381/0x6c0 [ 366.787270][T14231] pipe_write+0x914/0x1890 [ 366.791698][T14231] ? pipe_write+0x151/0x1890 [ 366.796324][T14231] ? pipe_read+0xfe0/0xfe0 [ 366.800841][T14231] ? fsnotify_perm+0x66/0x4b0 [ 366.805523][T14231] ? security_file_permission+0x83/0xa0 [ 366.811068][T14231] ? iov_iter_init+0x3f/0x120 [ 366.815785][T14231] vfs_write+0x725/0xd60 [ 366.820045][T14231] ? kernel_write+0x3c0/0x3c0 [ 366.824723][T14231] ? __fget_files+0x2c4/0x320 [ 366.829425][T14231] ? __fdget_pos+0x1f7/0x380 [ 366.834098][T14231] ? ksys_write+0x71/0x240 [ 366.838510][T14231] ksys_write+0x140/0x240 [ 366.843012][T14231] ? __ia32_sys_read+0x90/0x90 [ 366.847772][T14231] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 366.853831][T14231] ? debug_smp_processor_id+0x17/0x20 [ 366.859200][T14231] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 366.865261][T14231] __x64_sys_write+0x7b/0x90 [ 366.869844][T14231] do_syscall_64+0x31/0x40 [ 366.874280][T14231] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 366.880162][T14231] RIP: 0033:0x7fa3dccd26c9 [ 366.884574][T14231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 366.904174][T14231] RSP: 002b:00007fa3db73a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 366.912595][T14231] RAX: ffffffffffffffda RBX: 00007fa3dcf28fa0 RCX: 00007fa3dccd26c9 [ 366.920561][T14231] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 366.928530][T14231] RBP: 00007fa3db73a090 R08: 0000000000000000 R09: 0000000000000000 [ 366.936498][T14231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 366.944466][T14231] R13: 00007fa3dcf29038 R14: 00007fa3dcf28fa0 R15: 00007ffd06c55c08 [ 367.091371][T14253] device syzkaller0 entered promiscuous mode [ 367.377047][T14277] FAULT_INJECTION: forcing a failure. [ 367.377047][T14277] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 367.396674][T14277] CPU: 1 PID: 14277 Comm: syz.5.3907 Tainted: G W syzkaller #0 [ 367.405549][T14277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 367.415610][T14277] Call Trace: [ 367.418917][T14277] __dump_stack+0x21/0x24 [ 367.423258][T14277] dump_stack_lvl+0x169/0x1d8 [ 367.427941][T14277] ? show_regs_print_info+0x18/0x18 [ 367.433138][T14277] dump_stack+0x15/0x1c [ 367.437283][T14277] should_fail+0x3c1/0x510 [ 367.441694][T14277] should_fail_alloc_page+0x4f/0x60 [ 367.446902][T14277] __alloc_pages_nodemask+0x109/0x5f0 [ 367.452266][T14277] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 367.457800][T14277] ? copy_user_enhanced_fast_string+0xe/0x40 [ 367.463780][T14277] pipe_write+0x570/0x1890 [ 367.468197][T14277] ? pipe_write+0x151/0x1890 [ 367.472778][T14277] ? pipe_read+0xfe0/0xfe0 [ 367.477186][T14277] ? fsnotify_perm+0x66/0x4b0 [ 367.481870][T14277] ? security_file_permission+0x83/0xa0 [ 367.487416][T14277] ? iov_iter_init+0x3f/0x120 [ 367.492084][T14277] vfs_write+0x725/0xd60 [ 367.496665][T14277] ? kernel_write+0x3c0/0x3c0 [ 367.501336][T14277] ? bpf_send_signal_common+0x2b2/0x420 [ 367.506870][T14277] ? __fget_files+0x2c4/0x320 [ 367.511559][T14277] ? __fdget_pos+0x1f7/0x380 [ 367.516137][T14277] ? ksys_write+0x71/0x240 [ 367.520542][T14277] ksys_write+0x140/0x240 [ 367.524868][T14277] ? __ia32_sys_read+0x90/0x90 [ 367.529622][T14277] ? debug_smp_processor_id+0x17/0x20 [ 367.534986][T14277] __x64_sys_write+0x7b/0x90 [ 367.539570][T14277] do_syscall_64+0x31/0x40 [ 367.544082][T14277] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 367.549965][T14277] RIP: 0033:0x7f31c7f446c9 [ 367.554372][T14277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.574057][T14277] RSP: 002b:00007f31c69ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.582465][T14277] RAX: ffffffffffffffda RBX: 00007f31c819afa0 RCX: 00007f31c7f446c9 [ 367.590435][T14277] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 367.598401][T14277] RBP: 00007f31c69ac090 R08: 0000000000000000 R09: 0000000000000000 [ 367.606366][T14277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.614329][T14277] R13: 00007f31c819b038 R14: 00007f31c819afa0 R15: 00007ffe1185e1e8 [ 367.931455][T14275] device syzkaller0 entered promiscuous mode [ 368.196498][T14298] device veth0_vlan left promiscuous mode [ 368.221914][T14298] device veth0_vlan entered promiscuous mode [ 368.384541][T14309] device vlan1 entered promiscuous mode [ 368.550383][T14324] FAULT_INJECTION: forcing a failure. [ 368.550383][T14324] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 368.623933][T14324] CPU: 0 PID: 14324 Comm: syz.9.3920 Tainted: G W syzkaller #0 [ 368.632907][T14324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 368.642977][T14324] Call Trace: [ 368.646260][T14324] __dump_stack+0x21/0x24 [ 368.650593][T14324] dump_stack_lvl+0x169/0x1d8 [ 368.655273][T14324] ? show_regs_print_info+0x18/0x18 [ 368.660496][T14324] dump_stack+0x15/0x1c [ 368.664655][T14324] should_fail+0x3c1/0x510 [ 368.669082][T14324] should_fail_usercopy+0x1a/0x20 [ 368.674109][T14324] copy_page_from_iter+0x381/0x6c0 [ 368.679229][T14324] pipe_write+0x914/0x1890 [ 368.683656][T14324] ? kvm_sched_clock_read+0x18/0x40 [ 368.688873][T14324] ? pipe_write+0x151/0x1890 [ 368.693476][T14324] ? pipe_read+0xfe0/0xfe0 [ 368.697905][T14324] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 368.704075][T14324] ? iov_iter_init+0x3f/0x120 [ 368.708778][T14324] vfs_write+0x725/0xd60 [ 368.713029][T14324] ? kernel_write+0x3c0/0x3c0 [ 368.717723][T14324] ? bpf_send_signal_common+0x2b2/0x420 [ 368.723277][T14324] ? __fget_files+0x2c4/0x320 [ 368.727961][T14324] ? __fdget_pos+0x1f7/0x380 [ 368.732585][T14324] ? ksys_write+0x71/0x240 [ 368.737005][T14324] ksys_write+0x140/0x240 [ 368.741345][T14324] ? __ia32_sys_read+0x90/0x90 [ 368.746211][T14324] ? debug_smp_processor_id+0x17/0x20 [ 368.751593][T14324] __x64_sys_write+0x7b/0x90 [ 368.756203][T14324] do_syscall_64+0x31/0x40 [ 368.760631][T14324] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 368.766535][T14324] RIP: 0033:0x7f70f715a6c9 [ 368.770980][T14324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 368.790594][T14324] RSP: 002b:00007f70f5bc2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 368.799025][T14324] RAX: ffffffffffffffda RBX: 00007f70f73b0fa0 RCX: 00007f70f715a6c9 [ 368.807013][T14324] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 368.814995][T14324] RBP: 00007f70f5bc2090 R08: 0000000000000000 R09: 0000000000000000 [ 368.822969][T14324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 368.830938][T14324] R13: 00007f70f73b1038 R14: 00007f70f73b0fa0 R15: 00007fff27bbadd8 [ 370.033065][T14384] FAULT_INJECTION: forcing a failure. [ 370.033065][T14384] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 370.063617][T14384] CPU: 1 PID: 14384 Comm: syz.6.3937 Tainted: G W syzkaller #0 [ 370.072504][T14384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 370.082994][T14384] Call Trace: [ 370.086307][T14384] __dump_stack+0x21/0x24 [ 370.090657][T14384] dump_stack_lvl+0x169/0x1d8 [ 370.095373][T14384] ? show_regs_print_info+0x18/0x18 [ 370.100606][T14384] ? do_kern_addr_fault+0x80/0x80 [ 370.105737][T14384] dump_stack+0x15/0x1c [ 370.109897][T14384] should_fail+0x3c1/0x510 [ 370.114320][T14384] should_fail_alloc_page+0x4f/0x60 [ 370.119559][T14384] __alloc_pages_nodemask+0x109/0x5f0 [ 370.124938][T14384] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 370.130480][T14384] ? copy_user_enhanced_fast_string+0xe/0x40 [ 370.136447][T14384] pipe_write+0x570/0x1890 [ 370.140851][T14384] ? pipe_write+0x151/0x1890 [ 370.145432][T14384] ? pipe_read+0xfe0/0xfe0 [ 370.149890][T14384] ? fsnotify_perm+0x66/0x4b0 [ 370.154557][T14384] ? security_file_permission+0x83/0xa0 [ 370.160089][T14384] ? iov_iter_init+0x3f/0x120 [ 370.164752][T14384] vfs_write+0x725/0xd60 [ 370.168985][T14384] ? kernel_write+0x3c0/0x3c0 [ 370.173647][T14384] ? bpf_send_signal_common+0x2b2/0x420 [ 370.179175][T14384] ? __fget_files+0x2c4/0x320 [ 370.183839][T14384] ? __fdget_pos+0x1f7/0x380 [ 370.188468][T14384] ? ksys_write+0x71/0x240 [ 370.192912][T14384] ksys_write+0x140/0x240 [ 370.197231][T14384] ? __ia32_sys_read+0x90/0x90 [ 370.201986][T14384] ? debug_smp_processor_id+0x17/0x20 [ 370.207339][T14384] __x64_sys_write+0x7b/0x90 [ 370.211914][T14384] do_syscall_64+0x31/0x40 [ 370.216326][T14384] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 370.222202][T14384] RIP: 0033:0x7fa3dccd26c9 [ 370.226616][T14384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.246306][T14384] RSP: 002b:00007fa3db73a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 370.254717][T14384] RAX: ffffffffffffffda RBX: 00007fa3dcf28fa0 RCX: 00007fa3dccd26c9 [ 370.262676][T14384] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 370.270653][T14384] RBP: 00007fa3db73a090 R08: 0000000000000000 R09: 0000000000000000 [ 370.278655][T14384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 370.286723][T14384] R13: 00007fa3dcf29038 R14: 00007fa3dcf28fa0 R15: 00007ffd06c55c08 [ 370.969619][T14412] device syzkaller0 entered promiscuous mode [ 371.632277][T14437] device syzkaller0 entered promiscuous mode [ 371.943131][T14443] device veth0_vlan left promiscuous mode [ 371.986143][T14443] device veth0_vlan entered promiscuous mode [ 372.086252][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 372.127057][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 372.146571][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.819329][T14507] device syzkaller0 entered promiscuous mode [ 374.949041][T14586] FAULT_INJECTION: forcing a failure. [ 374.949041][T14586] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 374.990451][T14586] CPU: 0 PID: 14586 Comm: syz.8.3998 Tainted: G W syzkaller #0 [ 374.999347][T14586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 375.009496][T14586] Call Trace: [ 375.012880][T14586] __dump_stack+0x21/0x24 [ 375.017245][T14586] dump_stack_lvl+0x169/0x1d8 [ 375.021944][T14586] ? show_regs_print_info+0x18/0x18 [ 375.027166][T14586] ? do_kern_addr_fault+0x80/0x80 [ 375.032292][T14586] dump_stack+0x15/0x1c [ 375.036514][T14586] should_fail+0x3c1/0x510 [ 375.040950][T14586] should_fail_alloc_page+0x4f/0x60 [ 375.046159][T14586] __alloc_pages_nodemask+0x109/0x5f0 [ 375.051557][T14586] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 375.057117][T14586] ? copy_user_enhanced_fast_string+0xe/0x40 [ 375.063125][T14586] pipe_write+0x570/0x1890 [ 375.067590][T14586] ? pipe_write+0x151/0x1890 [ 375.072191][T14586] ? pipe_read+0xfe0/0xfe0 [ 375.076613][T14586] ? fsnotify_perm+0x66/0x4b0 [ 375.081307][T14586] ? security_file_permission+0x83/0xa0 [ 375.086867][T14586] ? iov_iter_init+0x3f/0x120 [ 375.091574][T14586] vfs_write+0x725/0xd60 [ 375.095850][T14586] ? kernel_write+0x3c0/0x3c0 [ 375.100974][T14586] ? bpf_send_signal_common+0x2b2/0x420 [ 375.106558][T14586] ? __fget_files+0x2c4/0x320 [ 375.111249][T14586] ? __fdget_pos+0x1f7/0x380 [ 375.115941][T14586] ? ksys_write+0x71/0x240 [ 375.120371][T14586] ksys_write+0x140/0x240 [ 375.124728][T14586] ? __ia32_sys_read+0x90/0x90 [ 375.129505][T14586] ? debug_smp_processor_id+0x17/0x20 [ 375.134894][T14586] __x64_sys_write+0x7b/0x90 [ 375.139496][T14586] do_syscall_64+0x31/0x40 [ 375.143928][T14586] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 375.149926][T14586] RIP: 0033:0x7ffb69e176c9 [ 375.154646][T14586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 375.174291][T14586] RSP: 002b:00007ffb6887f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 375.182718][T14586] RAX: ffffffffffffffda RBX: 00007ffb6a06dfa0 RCX: 00007ffb69e176c9 [ 375.190798][T14586] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 375.198781][T14586] RBP: 00007ffb6887f090 R08: 0000000000000000 R09: 0000000000000000 [ 375.206793][T14586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 375.214759][T14586] R13: 00007ffb6a06e038 R14: 00007ffb6a06dfa0 R15: 00007ffc68186a88 [ 375.339801][ T3972] syzkaller0: tun_net_xmit 76 [ 375.344718][ T3972] syzkaller0: tun_net_xmit 48 [ 375.363892][ C0] syzkaller0: tun_net_xmit 76 [ 375.893897][ C0] syzkaller0: tun_net_xmit 76 [ 376.195608][T14630] device pim6reg1 entered promiscuous mode [ 377.164512][T14692] device veth1_macvtap entered promiscuous mode [ 377.170836][T14692] device macsec0 entered promiscuous mode [ 377.214370][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 378.136535][T14741] device sit0 left promiscuous mode [ 378.471828][T14757] device pim6reg1 entered promiscuous mode [ 378.861019][T14778] device veth1_macvtap left promiscuous mode [ 378.916416][T14778] device macsec0 left promiscuous mode [ 378.989944][T14782] device macsec0 entered promiscuous mode [ 379.004426][T14782] device veth1_macvtap entered promiscuous mode [ 379.131892][T14785] device veth0_vlan left promiscuous mode [ 379.167722][T14785] device veth0_vlan entered promiscuous mode [ 379.986151][T14834] device wg2 left promiscuous mode [ 380.626190][T14886] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 380.632745][T14886] syzkaller0: linktype set to 778 [ 382.561135][T14949] device veth1_macvtap left promiscuous mode [ 382.588221][T14949] device macsec0 left promiscuous mode [ 383.191291][T14974] device syzkaller0 entered promiscuous mode [ 383.824561][T15005] : renamed from veth0_vlan [ 385.109327][T15094] FAULT_INJECTION: forcing a failure. [ 385.109327][T15094] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 385.172391][T15094] CPU: 1 PID: 15094 Comm: syz.7.4139 Tainted: G W syzkaller #0 [ 385.181287][T15094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 385.191372][T15094] Call Trace: [ 385.194686][T15094] __dump_stack+0x21/0x24 [ 385.199029][T15094] dump_stack_lvl+0x169/0x1d8 [ 385.203721][T15094] ? show_regs_print_info+0x18/0x18 [ 385.208937][T15094] ? do_kern_addr_fault+0x80/0x80 [ 385.213977][T15094] dump_stack+0x15/0x1c [ 385.218148][T15094] should_fail+0x3c1/0x510 [ 385.222578][T15094] should_fail_alloc_page+0x4f/0x60 [ 385.227792][T15094] __alloc_pages_nodemask+0x109/0x5f0 [ 385.233182][T15094] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 385.238770][T15094] ? copy_user_enhanced_fast_string+0xe/0x40 [ 385.244772][T15094] pipe_write+0x570/0x1890 [ 385.249207][T15094] ? pipe_write+0x151/0x1890 [ 385.253812][T15094] ? pipe_read+0xfe0/0xfe0 [ 385.258242][T15094] ? fsnotify_perm+0x66/0x4b0 [ 385.262936][T15094] ? security_file_permission+0x83/0xa0 [ 385.268490][T15094] ? iov_iter_init+0x3f/0x120 [ 385.273189][T15094] vfs_write+0x725/0xd60 [ 385.277468][T15094] ? kernel_write+0x3c0/0x3c0 [ 385.282159][T15094] ? bpf_send_signal_common+0x2b2/0x420 [ 385.287725][T15094] ? __fget_files+0x2c4/0x320 [ 385.292418][T15094] ? __fdget_pos+0x1f7/0x380 [ 385.297105][T15094] ? ksys_write+0x71/0x240 [ 385.301538][T15094] ksys_write+0x140/0x240 [ 385.305979][T15094] ? __ia32_sys_read+0x90/0x90 [ 385.310761][T15094] ? debug_smp_processor_id+0x17/0x20 [ 385.316308][T15094] __x64_sys_write+0x7b/0x90 [ 385.320918][T15094] do_syscall_64+0x31/0x40 [ 385.325351][T15094] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 385.331245][T15094] RIP: 0033:0x7faebe45a6c9 [ 385.335660][T15094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 385.355298][T15094] RSP: 002b:00007faebcec2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 385.363723][T15094] RAX: ffffffffffffffda RBX: 00007faebe6b0fa0 RCX: 00007faebe45a6c9 [ 385.371991][T15094] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 385.379967][T15094] RBP: 00007faebcec2090 R08: 0000000000000000 R09: 0000000000000000 [ 385.387940][T15094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 385.395913][T15094] R13: 00007faebe6b1038 R14: 00007faebe6b0fa0 R15: 00007fffcefe9ae8 [ 385.671482][T15122] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 385.728424][T15126] device macsec0 entered promiscuous mode [ 386.074773][T15152] FAULT_INJECTION: forcing a failure. [ 386.074773][T15152] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 386.093848][T15152] CPU: 0 PID: 15152 Comm: syz.8.4158 Tainted: G W syzkaller #0 [ 386.102720][T15152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 386.112780][T15152] Call Trace: [ 386.116078][T15152] __dump_stack+0x21/0x24 [ 386.120425][T15152] dump_stack_lvl+0x169/0x1d8 [ 386.125127][T15152] ? show_regs_print_info+0x18/0x18 [ 386.130342][T15152] dump_stack+0x15/0x1c [ 386.134519][T15152] should_fail+0x3c1/0x510 [ 386.139034][T15152] should_fail_usercopy+0x1a/0x20 [ 386.144070][T15152] copy_page_from_iter+0x381/0x6c0 [ 386.149191][T15152] pipe_write+0x914/0x1890 [ 386.153635][T15152] ? sched_clock_cpu+0x1b/0x3d0 [ 386.158502][T15152] ? pipe_write+0x151/0x1890 [ 386.163106][T15152] ? pipe_read+0xfe0/0xfe0 [ 386.167536][T15152] ? iov_iter_init+0x3f/0x120 [ 386.172222][T15152] ? iov_iter_init+0x49/0x120 [ 386.176910][T15152] vfs_write+0x725/0xd60 [ 386.181167][T15152] ? kernel_write+0x3c0/0x3c0 [ 386.185853][T15152] ? bpf_send_signal_common+0x2b2/0x420 [ 386.191419][T15152] ? __fget_files+0x2c4/0x320 [ 386.196110][T15152] ? __fdget_pos+0x1f7/0x380 [ 386.200705][T15152] ? ksys_write+0x71/0x240 [ 386.205133][T15152] ksys_write+0x140/0x240 [ 386.209477][T15152] ? __ia32_sys_read+0x90/0x90 [ 386.214260][T15152] ? debug_smp_processor_id+0x17/0x20 [ 386.219637][T15152] __x64_sys_write+0x7b/0x90 [ 386.224238][T15152] do_syscall_64+0x31/0x40 [ 386.228663][T15152] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 386.234647][T15152] RIP: 0033:0x7ffb69e176c9 [ 386.239071][T15152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.258675][T15152] RSP: 002b:00007ffb6887f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 386.267078][T15152] RAX: ffffffffffffffda RBX: 00007ffb6a06dfa0 RCX: 00007ffb69e176c9 [ 386.275080][T15152] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 386.283041][T15152] RBP: 00007ffb6887f090 R08: 0000000000000000 R09: 0000000000000000 [ 386.291014][T15152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 386.298971][T15152] R13: 00007ffb6a06e038 R14: 00007ffb6a06dfa0 R15: 00007ffc68186a88 [ 386.590192][T15184] device pim6reg1 entered promiscuous mode [ 386.918565][T15188] device syzkaller0 entered promiscuous mode [ 387.163695][T15206] FAULT_INJECTION: forcing a failure. [ 387.163695][T15206] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 387.281169][T15206] CPU: 1 PID: 15206 Comm: syz.9.4176 Tainted: G W syzkaller #0 [ 387.290077][T15206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 387.300137][T15206] Call Trace: [ 387.303440][T15206] __dump_stack+0x21/0x24 [ 387.307779][T15206] dump_stack_lvl+0x169/0x1d8 [ 387.312477][T15206] ? show_regs_print_info+0x18/0x18 [ 387.317700][T15206] dump_stack+0x15/0x1c [ 387.321861][T15206] should_fail+0x3c1/0x510 [ 387.326300][T15206] should_fail_alloc_page+0x4f/0x60 [ 387.331505][T15206] __alloc_pages_nodemask+0x109/0x5f0 [ 387.336897][T15206] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 387.342463][T15206] ? copy_user_enhanced_fast_string+0xe/0x40 [ 387.348461][T15206] pipe_write+0x570/0x1890 [ 387.352892][T15206] ? pipe_write+0x151/0x1890 [ 387.357498][T15206] ? pipe_read+0xfe0/0xfe0 [ 387.361919][T15206] ? fsnotify_perm+0x66/0x4b0 [ 387.366597][T15206] ? security_file_permission+0x83/0xa0 [ 387.372142][T15206] ? iov_iter_init+0x3f/0x120 [ 387.376823][T15206] vfs_write+0x725/0xd60 [ 387.381067][T15206] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 387.386873][T15206] ? kernel_write+0x3c0/0x3c0 [ 387.391553][T15206] ? __fget_files+0x2c4/0x320 [ 387.396242][T15206] ? __fdget_pos+0x1f7/0x380 [ 387.400829][T15206] ? ksys_write+0x71/0x240 [ 387.405247][T15206] ksys_write+0x140/0x240 [ 387.409577][T15206] ? __ia32_sys_read+0x90/0x90 [ 387.414343][T15206] ? debug_smp_processor_id+0x17/0x20 [ 387.419709][T15206] __x64_sys_write+0x7b/0x90 [ 387.424297][T15206] do_syscall_64+0x31/0x40 [ 387.428709][T15206] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 387.434619][T15206] RIP: 0033:0x7f70f715a6c9 [ 387.439034][T15206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 387.458636][T15206] RSP: 002b:00007f70f5bc2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 387.467053][T15206] RAX: ffffffffffffffda RBX: 00007f70f73b0fa0 RCX: 00007f70f715a6c9 [ 387.475038][T15206] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 387.483006][T15206] RBP: 00007f70f5bc2090 R08: 0000000000000000 R09: 0000000000000000 [ 387.491006][T15206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 387.498971][T15206] R13: 00007f70f73b1038 R14: 00007f70f73b0fa0 R15: 00007fff27bbadd8 [ 387.685072][T15217] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.714897][T15217] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.733005][T15217] device bridge_slave_0 entered promiscuous mode [ 387.774214][T15217] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.781416][T15217] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.881113][T15217] device bridge_slave_1 entered promiscuous mode [ 388.001648][T15254] bridge0: port 3(gretap0) entered disabled state [ 388.008185][T15254] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.015325][T15254] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.036549][T15254] device bridge0 left promiscuous mode [ 388.075657][T15252] device gretap0 left promiscuous mode [ 388.081465][T15252] bridge0: port 3(gretap0) entered disabled state [ 388.095445][T15252] device bridge_slave_1 left promiscuous mode [ 388.154439][T15252] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.239989][T15252] device bridge_slave_0 left promiscuous mode [ 388.305594][T15252] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.800555][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 388.808096][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 389.115613][T15282] device syzkaller0 entered promiscuous mode [ 389.145404][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 389.154816][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 389.163080][ T6319] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.170168][ T6319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.178136][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 389.186624][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 389.195682][ T6319] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.202744][ T6319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.210502][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 389.218857][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 389.227219][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 389.284601][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 389.293340][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 389.303712][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 389.312634][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 389.356628][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 389.364578][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.373217][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.387746][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 389.439010][T15217] device veth0_vlan entered promiscuous mode [ 389.512153][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 389.520656][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 389.530480][T15217] device veth1_macvtap entered promiscuous mode [ 389.566069][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 389.574199][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 389.582668][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 389.632972][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 389.641871][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 390.189984][T15307] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.197598][T15307] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.205178][T15307] device bridge_slave_0 entered promiscuous mode [ 390.214339][T15307] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.221399][T15307] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.228922][T15307] device bridge_slave_1 entered promiscuous mode [ 390.447872][T15307] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.454982][T15307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.462272][T15307] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.469331][T15307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.627907][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 390.704389][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.723993][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.801046][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 390.849348][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 390.867457][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.874570][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.923949][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 390.944058][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 390.963899][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.971078][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.004186][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 391.024211][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 391.068182][T15344] bridge0: port 3(veth0) entered blocking state [ 391.077229][T15344] bridge0: port 3(veth0) entered disabled state [ 391.101844][T15344] device veth0 entered promiscuous mode [ 391.116462][T15344] bridge0: port 3(veth0) entered blocking state [ 391.122872][T15344] bridge0: port 3(veth0) entered forwarding state [ 391.153320][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 391.174448][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 391.202445][T15307] device veth0_vlan entered promiscuous mode [ 391.234998][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 391.254885][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 391.269245][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 391.288226][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.323592][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 391.356911][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 391.402324][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 391.421062][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 391.457196][T15307] device veth1_macvtap entered promiscuous mode [ 391.480222][ T315] device veth0_vlan left promiscuous mode [ 391.720913][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 391.744427][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 391.756072][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 391.812531][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 391.838694][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 391.943360][T15383] device sit0 entered promiscuous mode [ 392.186769][T15390] device dummy0 entered promiscuous mode [ 392.213991][T15390] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 392.253572][T15398] device pim6reg1 entered promiscuous mode [ 392.742995][T15426] device pim6reg1 entered promiscuous mode [ 392.781784][T15426] ªªªªªª: renamed from vlan0 [ 393.034942][T15429] device wg2 left promiscuous mode [ 393.090298][T15440] device wg2 entered promiscuous mode [ 393.320895][ T315] device veth0_vlan left promiscuous mode [ 393.646890][T15474] device sit0 left promiscuous mode [ 393.663690][T15475] device sit0 entered promiscuous mode [ 394.032101][T15495] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 394.140355][T15495] device syzkaller0 entered promiscuous mode [ 395.690632][T15578] device lo entered promiscuous mode [ 396.473587][T15596] syz.6.4285[15596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.473676][T15596] syz.6.4285[15596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.552841][T15596] syz.6.4285[15596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.607546][T15596] syz.6.4285[15596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.999393][T15612] device syzkaller0 entered promiscuous mode [ 397.216636][T15629] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.237000][T15629] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.244116][T15629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.300926][T15635] device syzkaller0 entered promiscuous mode [ 397.592448][T15652] device syzkaller0 entered promiscuous mode [ 397.647232][T15654] pim6reg0: tun_chr_ioctl cmd 2147767520 [ 397.711690][T15654] pim6reg0: tun_chr_ioctl cmd 1074025672 [ 397.720750][T15654] pim6reg0: ignored: set checksum disabled [ 397.827749][T15675] device syzkaller0 entered promiscuous mode [ 398.771056][T15752] device syzkaller0 entered promiscuous mode [ 399.279927][T15805] device syzkaller0 entered promiscuous mode [ 399.338972][T15807] device syzkaller0 entered promiscuous mode [ 399.851868][T15868] device syzkaller0 entered promiscuous mode [ 399.860650][T15872] bridge0: port 3(veth0) entered disabled state [ 399.867171][T15872] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.874500][T15872] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.885971][T15870] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.893248][T15870] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.905189][T15872] bridge0: port 3(veth0) entered blocking state [ 399.911600][T15872] bridge0: port 3(veth0) entered forwarding state [ 399.918258][T15872] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.925809][T15872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.933190][T15872] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.940281][T15872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.951135][T15872] device bridge0 entered promiscuous mode [ 400.001309][T15870] device bridge_slave_1 left promiscuous mode [ 400.013334][T15870] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.028964][T15870] device bridge_slave_0 left promiscuous mode [ 400.035822][T15870] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.071689][T15882] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 400.442987][T15926] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.462565][T15926] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.470671][T15926] device bridge_slave_0 entered promiscuous mode [ 400.481370][T15926] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.502727][T15926] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.515635][T15926] device bridge_slave_1 entered promiscuous mode [ 400.676725][T15926] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.683807][T15926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.691103][T15926] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.698184][T15926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.724322][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 400.734703][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.771990][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.790856][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 400.804422][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.811510][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.837278][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 400.846596][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.853659][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.861665][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 400.904255][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 400.943597][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 400.980396][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 400.993647][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.002064][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 401.011065][T15926] device veth0_vlan entered promiscuous mode [ 401.029695][T16006] device sit0 left promiscuous mode [ 401.046754][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 401.077960][T15926] device veth1_macvtap entered promiscuous mode [ 401.109012][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 401.127423][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 401.164234][ T6319] device bridge_slave_1 left promiscuous mode [ 401.174496][ T6319] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.182032][ T6319] device bridge_slave_0 left promiscuous mode [ 401.204075][ T6319] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.352616][T16041] device syzkaller0 entered promiscuous mode [ 401.371917][T16047] device veth1_to_bond entered promiscuous mode [ 401.606997][T16083] bridge0: port 4(veth1) entered blocking state [ 401.613369][T16083] bridge0: port 4(veth1) entered disabled state [ 401.620541][T16083] device veth1 entered promiscuous mode [ 401.636917][T16083] bridge0: port 4(veth1) entered blocking state [ 401.643235][T16083] bridge0: port 4(veth1) entered forwarding state [ 401.954376][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 401.965752][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 401.977045][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 401.988501][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 401.999788][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 402.011357][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 402.022705][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 402.034095][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 402.045342][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 405.073782][ C1] net_ratelimit: 47689 callbacks suppressed [ 405.073795][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 405.076478][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.079810][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 405.091659][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.102087][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 405.113919][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 405.124456][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 405.139923][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.147006][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 405.158831][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.083778][ C1] net_ratelimit: 71347 callbacks suppressed [ 410.083792][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 410.084938][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.089861][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 410.103208][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 410.112147][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 410.133202][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.134395][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 410.147297][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.156757][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 410.170228][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 415.093803][ C0] net_ratelimit: 71591 callbacks suppressed [ 415.093816][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.093841][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 415.099936][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 415.111168][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 415.122815][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.133486][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 415.144610][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.155707][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 415.166817][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.177939][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 420.103833][ C1] net_ratelimit: 95721 callbacks suppressed [ 420.103846][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 420.104042][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.109902][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 420.121189][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 420.132342][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 420.143997][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.154722][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 420.165879][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.177016][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 420.188155][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.113939][ C0] net_ratelimit: 86632 callbacks suppressed [ 425.113953][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.114999][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 425.120015][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.131143][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 425.142270][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.153451][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 425.164586][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 425.175675][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 425.186995][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.197870][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 430.123852][ C1] net_ratelimit: 89966 callbacks suppressed [ 430.123872][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 430.123986][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.129918][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 430.141020][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.152269][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 430.163624][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.174741][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 430.185862][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 430.196977][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 430.208413][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.133835][ C1] net_ratelimit: 89732 callbacks suppressed [ 435.133847][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 435.133868][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.139879][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 435.151015][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.162085][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 435.173285][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.184489][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 435.195582][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 435.206689][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 435.217804][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.143815][ C1] net_ratelimit: 93148 callbacks suppressed [ 440.143828][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 440.143914][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.149846][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 440.160988][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.172117][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 440.183212][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.194299][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 440.205437][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 440.216502][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 440.228093][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 445.153778][ C1] net_ratelimit: 94954 callbacks suppressed [ 445.153792][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 445.154109][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 445.159826][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 445.170965][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 445.182219][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 445.193313][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 445.204433][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 445.215521][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 445.226970][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 445.238059][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 450.163801][ C1] net_ratelimit: 93733 callbacks suppressed [ 450.163815][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 450.163859][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 450.169871][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 450.181179][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 450.192101][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 450.203863][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 450.214502][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 450.225613][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 450.236685][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 450.247786][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.173766][ C0] net_ratelimit: 90082 callbacks suppressed [ 455.173780][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.173802][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 455.179844][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.191011][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 455.202080][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 455.213219][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 455.224305][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.235442][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 455.246551][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.257660][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 460.183779][ C1] net_ratelimit: 87872 callbacks suppressed [ 460.183793][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 460.184280][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.189822][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 460.201019][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.212120][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 460.223225][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.234323][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 460.245518][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 460.256601][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 460.267727][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.193841][ C1] net_ratelimit: 92657 callbacks suppressed [ 465.193855][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 465.194010][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.199877][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 465.210998][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.222148][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 465.233266][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.244344][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 465.255472][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 465.266742][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 465.283774][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.203755][ C0] net_ratelimit: 99279 callbacks suppressed [ 470.203769][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 470.203821][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 470.210392][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.220929][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 470.232015][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.243241][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 470.254352][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.265451][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 470.276568][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.287663][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 475.213758][ C1] net_ratelimit: 94884 callbacks suppressed [ 475.213776][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 475.213995][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.219825][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 475.230978][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 475.242192][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 475.253479][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 475.264426][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 475.284502][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.286615][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 475.297797][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.223751][ C1] net_ratelimit: 88869 callbacks suppressed [ 480.223765][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 480.223810][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.229811][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 480.240929][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.252035][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 480.263112][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 480.274287][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 480.285348][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.296495][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 480.307603][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.233749][ C1] net_ratelimit: 86043 callbacks suppressed [ 485.233762][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 485.234371][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.239764][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 485.251008][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.262111][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 485.273222][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.293888][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 485.296109][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.307173][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 485.318295][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.243789][ C0] net_ratelimit: 93162 callbacks suppressed [ 490.243802][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.243860][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 490.249819][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.260974][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 490.272194][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.284010][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 490.294463][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 490.305581][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 490.316688][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.327908][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 495.253761][ C1] net_ratelimit: 93702 callbacks suppressed [ 495.253772][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 495.254370][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.259886][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 495.271086][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.282273][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 495.293371][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.304487][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 495.315575][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.326772][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 495.337868][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 500.263768][ C1] net_ratelimit: 92420 callbacks suppressed [ 500.263781][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 500.263837][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 500.269815][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 500.281548][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 500.292037][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 500.303151][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 500.314245][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 500.325374][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 500.343292][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 500.347567][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 505.273844][ C1] net_ratelimit: 92704 callbacks suppressed [ 505.273856][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 505.274284][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 505.279962][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 505.291161][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 505.302272][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 505.313389][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 505.324507][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 505.335619][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 505.346848][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 505.357925][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 510.283747][ C0] net_ratelimit: 93945 callbacks suppressed [ 510.283759][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 510.283798][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 510.289793][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 510.300927][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 510.312005][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 510.323130][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 510.334290][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 510.345345][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 510.356436][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 510.367723][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 515.293755][ C1] net_ratelimit: 92351 callbacks suppressed [ 515.293767][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 515.294346][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 515.299860][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 515.310993][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 515.322101][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 515.333189][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 515.344325][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 515.355440][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 515.366553][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 515.377645][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 520.303727][ C1] net_ratelimit: 93139 callbacks suppressed [ 520.303739][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 520.303757][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 520.309743][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 520.320883][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 520.332026][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 520.343122][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 520.354237][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 520.365368][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 520.376477][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 520.387595][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 525.313789][ C1] net_ratelimit: 91479 callbacks suppressed [ 525.313802][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 525.313825][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 525.319830][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 525.330973][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 525.342094][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 525.353625][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 525.364283][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 525.376050][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 525.386507][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 525.397604][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 530.323730][ C1] net_ratelimit: 87854 callbacks suppressed [ 530.323742][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 530.334476][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 530.340901][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 530.351979][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 530.363096][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 530.374434][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 530.385308][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 530.396450][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 530.407527][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 530.418630][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 535.333731][ C1] net_ratelimit: 89053 callbacks suppressed [ 535.333744][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 535.333826][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 535.339821][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 535.350919][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 535.362310][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 535.383803][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 535.384576][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 535.396291][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 535.407239][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 535.418355][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 540.343746][ C1] net_ratelimit: 91967 callbacks suppressed [ 540.343760][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 540.344065][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 540.349815][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 540.361047][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 540.372160][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 540.383505][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 540.394394][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 540.405500][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 540.416593][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 540.427707][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 545.353749][ C1] net_ratelimit: 93377 callbacks suppressed [ 545.353761][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 545.353801][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 545.359887][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 545.371010][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 545.382160][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 545.393274][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 545.404365][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 545.415477][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 545.426593][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 545.437683][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.363730][ C0] net_ratelimit: 94374 callbacks suppressed [ 550.363743][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 550.363751][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 550.363845][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 550.370225][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 550.380903][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 550.392743][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.403223][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 550.414338][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.425463][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 550.436809][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.373746][ C1] net_ratelimit: 93631 callbacks suppressed [ 555.373760][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 555.373784][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.379898][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 555.391115][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.402159][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 555.413264][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.424389][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 555.435478][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 555.446603][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 555.457675][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.383717][ C1] net_ratelimit: 91634 callbacks suppressed [ 560.383732][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 560.384225][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 560.389843][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 560.401587][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.412068][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 560.423179][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.434295][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 560.445597][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.456453][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 560.467562][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.393764][ C1] net_ratelimit: 92249 callbacks suppressed [ 565.393796][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 565.394453][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.399903][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 565.411075][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.422180][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 565.433480][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.444341][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 565.463835][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.466771][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 565.477848][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 570.403718][ C0] net_ratelimit: 94359 callbacks suppressed [ 570.403731][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 570.403770][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 570.409780][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 570.420915][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 570.432466][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 570.443110][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 570.455027][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 570.465482][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 570.476593][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 570.487724][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 575.413698][ C1] net_ratelimit: 95743 callbacks suppressed [ 575.413710][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 575.413783][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 575.419841][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 575.430983][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 575.442089][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 575.453181][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 575.464265][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 575.475385][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 575.486455][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 575.497549][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 580.423749][ C1] net_ratelimit: 93713 callbacks suppressed [ 580.423763][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 580.423818][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 580.429799][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 580.440905][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 580.452027][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 580.463123][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 580.474297][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 580.485358][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 580.496439][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 580.508086][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 585.433759][ C1] net_ratelimit: 90914 callbacks suppressed [ 585.433772][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 585.433828][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 585.439794][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 585.450906][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 585.462012][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 585.473108][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 585.484196][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 585.495676][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 585.506387][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 585.517471][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 590.443719][ C1] net_ratelimit: 92808 callbacks suppressed [ 590.443731][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 590.443770][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 590.449900][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 590.460987][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 590.472100][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 590.483190][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 590.494314][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 590.505433][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 590.516515][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 590.527620][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.453715][ C0] net_ratelimit: 91832 callbacks suppressed [ 595.453727][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.453734][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 595.453806][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 595.459757][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.470996][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 595.482084][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.493239][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 595.513935][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.515432][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 595.526606][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 600.463694][ C1] net_ratelimit: 92371 callbacks suppressed [ 600.463708][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 600.463915][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.469844][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 600.480974][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.492087][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 600.503394][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.514295][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 600.525480][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.536587][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 600.547671][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.473794][ C1] net_ratelimit: 91824 callbacks suppressed [ 605.473807][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 605.473830][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.479819][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 605.490937][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.502084][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 605.513392][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.524261][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 605.535377][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.546488][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 605.557651][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.483704][ C1] net_ratelimit: 89766 callbacks suppressed [ 610.483716][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 610.483822][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 610.489764][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 610.501531][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.511979][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 610.523082][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.534191][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 610.545510][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.556381][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 610.567497][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.493714][ C1] net_ratelimit: 90059 callbacks suppressed [ 615.493728][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 615.493766][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.499769][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 615.510872][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.522010][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 615.533303][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.544214][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 615.555325][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.566444][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 615.577545][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.503721][ C1] net_ratelimit: 92059 callbacks suppressed [ 620.503732][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 620.503740][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 620.503813][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.509794][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 620.520892][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 620.532000][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 620.543095][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.554222][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 620.565304][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.576437][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 625.513734][ C1] net_ratelimit: 90489 callbacks suppressed [ 625.513747][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 625.513797][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.519772][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 625.530895][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 625.542025][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 625.553135][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.564229][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 625.575334][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 625.586436][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 625.597703][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.523736][ C1] net_ratelimit: 90539 callbacks suppressed [ 630.523749][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 630.523756][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.524046][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.529873][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 630.541022][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.552112][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 630.563210][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.574341][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 630.585448][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 630.596550][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 635.533706][ C1] net_ratelimit: 91544 callbacks suppressed [ 635.533719][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 635.533805][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.539738][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 635.550843][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.562044][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 635.573136][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.584257][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 635.595359][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 635.606464][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 635.617857][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.543711][ C1] net_ratelimit: 91176 callbacks suppressed [ 640.543725][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 640.543745][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.549879][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 640.561192][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.572413][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 640.583540][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.594635][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 640.606240][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.616864][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 640.627981][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 645.553722][ C1] net_ratelimit: 91557 callbacks suppressed [ 645.553735][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 645.553772][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.559743][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 645.570866][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 645.581977][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 645.593096][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.604200][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 645.615282][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.626460][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 645.637568][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.563706][ C1] net_ratelimit: 91411 callbacks suppressed [ 650.563719][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 650.563781][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.569769][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 650.580879][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.592251][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 650.603352][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.614448][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 650.626014][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.636672][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 650.647768][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 655.573688][ C1] net_ratelimit: 90007 callbacks suppressed [ 655.573701][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 655.573827][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 655.579895][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 655.591046][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 655.602124][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 655.613448][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 655.624329][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 655.635448][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 655.646609][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 655.657661][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 660.583672][ C1] net_ratelimit: 90309 callbacks suppressed [ 660.583685][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 660.583733][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 660.589725][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 660.600831][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 660.611953][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 660.623306][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 660.634591][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 660.645609][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 660.656717][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 660.667795][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 665.593751][ C1] net_ratelimit: 88804 callbacks suppressed [ 665.593765][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 665.593940][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 665.599800][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 665.611937][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 665.622180][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 665.633240][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 665.644460][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 665.655775][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 665.666666][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 665.677761][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.603696][ C1] net_ratelimit: 88472 callbacks suppressed [ 670.603708][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 670.604412][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.609742][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 670.620853][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.631976][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 670.643322][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.654158][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 670.665291][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.676412][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 670.687708][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.613715][ C1] net_ratelimit: 89237 callbacks suppressed [ 675.613729][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 675.613811][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.619758][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 675.630892][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.641973][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 675.653070][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.664185][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 675.675268][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 675.686455][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 675.697549][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 680.623728][ C1] net_ratelimit: 90122 callbacks suppressed [ 680.623742][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 680.623795][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 680.629768][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 680.640930][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 680.652027][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 680.663827][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 680.674323][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 680.685369][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 680.696473][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 680.707925][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 685.633667][ C1] net_ratelimit: 89246 callbacks suppressed [ 685.633680][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 685.634344][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 685.639737][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 685.650850][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 685.662298][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 685.673797][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 685.685027][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 685.696160][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 685.707326][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 685.718473][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 690.643741][ C1] net_ratelimit: 87173 callbacks suppressed [ 690.643755][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 690.644049][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 690.649945][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 690.661045][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 690.672135][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 690.683475][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 690.694353][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 690.705455][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 690.716575][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 690.727701][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 695.653705][ C1] net_ratelimit: 89397 callbacks suppressed [ 695.653719][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 695.653915][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 695.659774][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 695.670949][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 695.682006][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 695.693119][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 695.704243][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 695.724643][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 695.726681][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 695.737772][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 700.663655][ C1] net_ratelimit: 88327 callbacks suppressed [ 700.663669][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 700.663992][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 700.669811][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 700.680937][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 700.692069][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 700.703689][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 700.714322][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 700.725939][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 700.736771][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 700.747847][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 705.673715][ C1] net_ratelimit: 89872 callbacks suppressed [ 705.673728][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 705.673736][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 705.673814][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 705.679783][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 705.691410][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 705.702046][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 705.713724][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 705.724466][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 705.735575][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 705.746687][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 710.683728][ C1] net_ratelimit: 90929 callbacks suppressed [ 710.683742][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 710.683957][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 710.689772][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 710.701254][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 710.712124][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 710.723226][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 710.734336][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 710.745445][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 710.756625][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 710.768412][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 715.693715][ C1] net_ratelimit: 89918 callbacks suppressed [ 715.693734][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 715.693912][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 715.699804][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 715.711005][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 715.722102][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 715.733213][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 715.744337][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 715.756097][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 715.766566][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 715.777980][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)