last executing test programs: 31m11.741922397s ago: executing program 4 (id=3808): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x50) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x5, &(0x7f0000000000)=@raw=[@map_idx={0x18, 0x9, 0x5, 0x0, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @jmp={0x5, 0x1, 0xa, 0xa, 0x9, 0xffffffffffffffe0, 0x18}], &(0x7f0000000080)='GPL\x00', 0xfff, 0x3e, &(0x7f0000000140)=""/62, 0x41000, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[r0, r1, r0, r1, r1, r0, r1, r0], 0x0, 0x10, 0x2}, 0x94) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000500)={0x75, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={@fallback=r0, r2, 0x0, 0x2c, 0x0, @void, @void, @void, @value=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000000e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001d40)={{r1}, &(0x7f0000000540), &(0x7f0000001d00)='%pI4 \x00'}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 31m11.659175111s ago: executing program 4 (id=3810): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x13, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x64}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func={0x5, 0x0, 0x0, 0xc, 0x2}, @typedef={0x3, 0x0, 0x0, 0x8, 0x1}, @float={0x1, 0x0, 0x0, 0x10, 0x10}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000140)=""/157, 0x40, 0x9d, 0x0, 0x835}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x16, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000c0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x3b}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sock_ops=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x100000000) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200052f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa1100"], 0xcfa4) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x16, &(0x7f0000000740)=ANY=[@ANYRES16=r1], &(0x7f0000000100)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080)={'erspan0', 0x32, 0x37}, 0xa) 31m10.822951989s ago: executing program 4 (id=3827): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8abcb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x7, 0x0, 0x1, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x4000, 0x0, 0x0}, 0x30) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r5 = openat$cgroup_int(r0, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) socketpair(0x1d, 0x5, 0x8, &(0x7f00000003c0)={0xffffffffffffffff}) write$cgroup_subtree(r2, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) write$cgroup_int(r5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg(r8, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[{0x10, 0x1b2, 0x4}, {0x10, 0x1, 0xfffffffe}], 0x20}, 0x800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xbf, 0x0, &(0x7f0000000100)="b9fffe316844268cb89e14f086dd47e0ffff26128803631177fbac141416e000030a440a9f03fe80000000000000000000000000002e01070b038da188fe25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x2800000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c250000000000202020c31af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETFILTEREBPF(r7, 0x800454e1, &(0x7f0000000440)=r4) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00'}, 0x94) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x0, 0x200000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000400)=r9, 0x4) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 31m10.572276527s ago: executing program 4 (id=3835): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x2000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'bridge_slave_0\x00', 0x4000}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="6a0ac4ff0000000071796e3fbc873a085c5271b0105300000000009500000040000000", @ANYRESOCT, @ANYRESOCT=0x0, @ANYRES64, @ANYRES16=r0, @ANYRESDEC=r0, @ANYBLOB="d039ca51946c4bbe3447e1b836b099d00aadbc268e11884208288aa8a250c422ef32b73b1342ffd31b5f67c8d3bcc0a1eac054ac49510a3699aae090d2f2a990b56b01bda015901beb77fd0ce2bef8789e0c377787c60e9accb21b778666a1bd63b2848f96047f9ad9399af55e3d9f397ae77d47e09d6720"], &(0x7f0000000480)='GPL\x00'}, 0x94) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc8, 0x0, 0x0, 0x0, 0x800007f, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xcc, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)=@generic={&(0x7f0000000840)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x17, 0x10, &(0x7f0000000a00)=ANY=[@ANYBLOB="fb58060005000000185000000d0000000000000000000000d08b20001000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000f00000085000000060000003900f0fff0ffffff85a810000800000018330000020000000000000000000000a5f2cdb2d0c0c8c2e9e47523103cc615ca153c77d5730afc6431fe"], &(0x7f0000000240)='GPL\x00', 0x1000, 0x91, &(0x7f0000000280)=""/145, 0x41000, 0x10, '\x00', r3, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x0, 0xc, 0x0, 0x4}, 0x10, 0x0, r2, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900), 0x10, 0x4}, 0x94) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x80000000}}, @struct={0xb, 0x1, 0x0, 0x4, 0x1, 0x2, [{0xe, 0x1, 0x2}]}]}, {0x0, [0x0, 0x51]}}, &(0x7f0000000180)=""/75, 0x4c, 0x4b, 0x1, 0x6}, 0x28) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@map=r1, 0x5, 0x0, 0x73, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0}, 0x40) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0xeb, 0x18}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2211052f00fe800000fe800000875a65059ff57b00000000000000000000000000ac1414aa000088a8"], 0xcfa4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffca}, 0x164) write$cgroup_pid(r12, &(0x7f0000000000), 0x12) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={@map=r8, r2, 0x31, 0x2000, 0x0, @value=r10, @void, @void, @void, r7}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1b0000000000000000000000ffffffff00000000", @ANYRES32=r1, @ANYBLOB="00040000000000000000000000000000000000004dd7ec0947a996769c8ccb96447335c8460bb721d4d3e80641bab7fee82fc8e52fc7f27d0473eabbb1bfc5032dabefc78afdc15e40795fa20ec9b59ab9495dd0e8f6b982cd4fb0d3e4b293d54841b3a5d0a86f2ab8d6595a6c14e7a683821ccee7afdee32620509b", @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="04000000050000000500"/28], 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000940)={r12, r6}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x2000, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'bridge_slave_0\x00', 0x4000}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="6a0ac4ff0000000071796e3fbc873a085c5271b0105300000000009500000040000000", @ANYRESOCT, @ANYRESOCT=0x0, @ANYRES64, @ANYRES16=r0, @ANYRESDEC=r0, @ANYBLOB="d039ca51946c4bbe3447e1b836b099d00aadbc268e11884208288aa8a250c422ef32b73b1342ffd31b5f67c8d3bcc0a1eac054ac49510a3699aae090d2f2a990b56b01bda015901beb77fd0ce2bef8789e0c377787c60e9accb21b778666a1bd63b2848f96047f9ad9399af55e3d9f397ae77d47e09d6720"], &(0x7f0000000480)='GPL\x00'}, 0x94) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d}, 0x94) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc8, 0x0, 0x0, 0x0, 0x800007f, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xcc, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)=@generic={&(0x7f0000000840)='./file0\x00', 0x0, 0x8}, 0x18) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x17, 0x10, &(0x7f0000000a00)=ANY=[@ANYBLOB="fb58060005000000185000000d0000000000000000000000d08b20001000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000f00000085000000060000003900f0fff0ffffff85a810000800000018330000020000000000000000000000a5f2cdb2d0c0c8c2e9e47523103cc615ca153c77d5730afc6431fe"], &(0x7f0000000240)='GPL\x00', 0x1000, 0x91, &(0x7f0000000280)=""/145, 0x41000, 0x10, '\x00', r3, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x0, 0xc, 0x0, 0x4}, 0x10, 0x0, r2, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900), 0x10, 0x4}, 0x94) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x80000000}}, @struct={0xb, 0x1, 0x0, 0x4, 0x1, 0x2, [{0xe, 0x1, 0x2}]}]}, {0x0, [0x0, 0x51]}}, &(0x7f0000000180)=""/75, 0x4c, 0x4b, 0x1, 0x6}, 0x28) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@map=r1, 0x5, 0x0, 0x73, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0]}, 0x40) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0xeb, 0x18}, 0xc) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r10, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2211052f00fe800000fe800000875a65059ff57b00000000000000000000000000ac1414aa000088a8"], 0xcfa4) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffca}, 0x164) (async) write$cgroup_pid(r12, &(0x7f0000000000), 0x12) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={@map=r8, r2, 0x31, 0x2000, 0x0, @value=r10, @void, @void, @void, r7}, 0x20) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1b0000000000000000000000ffffffff00000000", @ANYRES32=r1, @ANYBLOB="00040000000000000000000000000000000000004dd7ec0947a996769c8ccb96447335c8460bb721d4d3e80641bab7fee82fc8e52fc7f27d0473eabbb1bfc5032dabefc78afdc15e40795fa20ec9b59ab9495dd0e8f6b982cd4fb0d3e4b293d54841b3a5d0a86f2ab8d6595a6c14e7a683821ccee7afdee32620509b", @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="04000000050000000500"/28], 0x50) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000940)={r12, r6}, 0xc) (async) 31m10.47643607s ago: executing program 4 (id=3837): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340)=r3, 0x4) (async) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x20040800) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00'}, 0x65) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000200008500000008"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x34, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 31m10.454631461s ago: executing program 4 (id=3838): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000400000006000000ff00000042000000", @ANYRES32, @ANYBLOB="9ad734574f45f35f77"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000800000004000000bb7f1a004d20feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000280), &(0x7f0000000240)=r2}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001140)={&(0x7f0000000040)='?\\*', &(0x7f0000000080)=""/4096, &(0x7f0000001080)="573b15608735294c6d3d14440c388b752533e30112b429ae08efbfba1de134f44118fa085b950cb67e98b34549eaa9a8999973135c8f1ad77b72ca6878c04c4aea", &(0x7f0000001100)="6fe89cefede5ed8a1f758bedeba0fe9bcb33e2458518fa827f4dfe53a09dbc245c618bafc35ec1666800374eb50693", 0xffffff80, r0}, 0x38) 30m55.38478854s ago: executing program 32 (id=3838): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000400000006000000ff00000042000000", @ANYRES32, @ANYBLOB="9ad734574f45f35f77"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000800000004000000bb7f1a004d20feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000280), &(0x7f0000000240)=r2}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001140)={&(0x7f0000000040)='?\\*', &(0x7f0000000080)=""/4096, &(0x7f0000001080)="573b15608735294c6d3d14440c388b752533e30112b429ae08efbfba1de134f44118fa085b950cb67e98b34549eaa9a8999973135c8f1ad77b72ca6878c04c4aea", &(0x7f0000001100)="6fe89cefede5ed8a1f758bedeba0fe9bcb33e2458518fa827f4dfe53a09dbc245c618bafc35ec1666800374eb50693", 0xffffff80, r0}, 0x38) 13m24.674818213s ago: executing program 0 (id=19041): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000100)=r2, 0x4) (async) sendmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="4d8e", 0x2}], 0x1}, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000}, 0x50) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x4, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x9e, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x5}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ec0)={0x18, 0x19, &(0x7f0000001c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6fdb, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001d40)='GPL\x00', 0x305a, 0xf, &(0x7f0000001d80)=""/15, 0x41100, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001e40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001e80)=[{0x1, 0x2, 0x3, 0x7}, {0x2, 0x4, 0x5, 0x8}], 0x10, 0x2}, 0x94) socketpair(0x1, 0x5, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) (async) perf_event_open(0x0, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x3, 0x5, 0x11, 0x7, 0x0, 0x3, 0x8008c, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfffffff, 0x0, @perf_bp={0x0, 0x8}, 0x1035a, 0x5, 0x1000007, 0x9, 0x8, 0x5, 0x5, 0x0, 0x2, 0x0, 0x40000002}, 0x0, 0x8, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f0, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xbd, 0x5, 0x80, 0x7, 0x0, 0x7fffffff, 0x7a5d4, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfffffff, 0x0, @perf_bp={0x0, 0xe}, 0x2, 0x1, 0xa, 0x7, 0x81, 0x8, 0x9, 0x0, 0x20002, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x8) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f0, &(0x7f0000000080)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000020c0)={@cgroup, r5, 0x1f, 0x11, r6, @void, @value=r4}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x1f, 0x11, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRESDEC, @ANYBLOB="0000000000000000b70500000800000085000000a700000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@ptr={0x4, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x61, 0x30, 0x2e, 0x5f, 0x61, 0x2e, 0x61]}}, &(0x7f0000000540)=""/5, 0x2d, 0x5, 0x1, 0x6}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x3, 0xe407, 0x7, 0xa7fa, 0x10, 0xffffffffffffffff, 0x5, '\x00', 0x0, r9, 0x2, 0x4, 0x3}, 0x50) (async) r10 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="284d90b9f35fef4b53424edef2284b19e3aaa74a82da370fea0687d6f0fccb9d0b288c423373603bec2b84abdea932ebcf5ba79328828570c30ab4380f0740ba58d5585751938dc200f5221af6ea07293710a46db913f7d26d3f6b734f4f6bd21cf3e68b5b81c349e868c784e5e642efec", @ANYBLOB="53f73087f9fd17c0bd30605929080745f526e2e068565558a3d223ab6e2e86c8b8", @ANYRESDEC=r10, @ANYRES64=0x0, @ANYRES32=r10, @ANYRES8=r12, @ANYRESDEC=r12, @ANYRESDEC=r12], 0x177}, 0x0) recvmsg$unix(r11, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x123) 13m24.573719637s ago: executing program 0 (id=19044): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000001ed905000000000000000700"/32], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) 13m24.550232687s ago: executing program 0 (id=19045): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000000300)=""/209, 0x32, 0xd1, 0x2}, 0x28) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000c9"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000c9"], 0x0}, 0x90) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="696e65745f634c5aba587020"], 0x19) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xffc0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007044f16c01b1fbfd000000000000008af65f0df9928941994cc8c173fac5688671085a86d143c59fed0e57feb97f422c51d8e63b4ed9e295df3ccd1a55752dfc2f32f14b6c8f0e7413c3e9caaad30dcb412d0f54623f388bb2c63d2b1f7d83cd0cc021867bb4aee9967a6ee83e1b18fd8beca7d7eddcd96634"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x1, 0x1}, 0x8}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x10, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000007910280000000000693c0000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x2, 0xba, &(0x7f00000002c0)=""/186, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 13m24.351988664s ago: executing program 0 (id=19050): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xa, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x10000000000001, 0x89f, 0x0, 0x4, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x189001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'nr0\x00', 0x20}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="180800001b000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000002b702000000000000736af8ff00000000b5090000feffffff7baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018260000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000028500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x80b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1d, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x406, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x7, 0x4, 0x5, 0x0, r1, 0x6, '\x00', 0x0, r9, 0x3, 0x4, 0x2}, 0x50) 13m21.23065126s ago: executing program 0 (id=19084): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x318, 0x0, 0xdb0, 0xf5ffffff}, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) close(0x3) setsockopt$sock_attach_bpf(r0, 0x1, 0x2c, &(0x7f0000000100), 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000800), 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x800c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0xffffffffffffff20}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000026010000f8ffffffb702000008000000b703000000000000850000000800000018010000202070250000000000202020dd1af5ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 13m21.150781882s ago: executing program 0 (id=19091): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f0000000100), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYRES32, @ANYRES64=r4], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000000)='cpu&\t\t') syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f00000003c0)={0x1, 0x80, 0x4, 0xfd, 0x3, 0x9, 0x0, 0xaa, 0x80, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x7fffffff, 0xa6, 0x4, 0x5, 0x7, 0x5, 0x0, 0x10000, 0x0, 0x1}) write$cgroup_pid(r10, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="2b70696473206aa4af"], 0x6) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000000680)={&(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x0, {0x2, 0x4, 0x4}}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000440)="96dc7e5adf40bacc1fa501fb342515376c99369253a2126f70b5274f", 0x1c}, {&(0x7f0000000540)="2e0475619286cb56029babf56efe710515a684147aa887418cb02adb1afd13759665045c6535919b3a56e37512e4906676dbefe048864e38735403cfa49590daf38f6f1376eae1ae33aefa4a9ed52b404284a105e5b57abe5ab91a047674418a7a4e57d47fa63b98aa6503e81b9cdd25f6bd7c168e52573245ad83b95a893ac4a442a474", 0x84}], 0x2, &(0x7f0000000640)="fd6ae92f9efad87717fb44dd4a29081771e8780f808c24bccb0a", 0x1a, 0x4000000}, 0x24044851) 13m5.698115964s ago: executing program 33 (id=19091): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f0000000100), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYRES32, @ANYRES64=r4], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000000)='cpu&\t\t') syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f00000003c0)={0x1, 0x80, 0x4, 0xfd, 0x3, 0x9, 0x0, 0xaa, 0x80, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x7fffffff, 0xa6, 0x4, 0x5, 0x7, 0x5, 0x0, 0x10000, 0x0, 0x1}) write$cgroup_pid(r10, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="2b70696473206aa4af"], 0x6) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000000680)={&(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x0, {0x2, 0x4, 0x4}}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000440)="96dc7e5adf40bacc1fa501fb342515376c99369253a2126f70b5274f", 0x1c}, {&(0x7f0000000540)="2e0475619286cb56029babf56efe710515a684147aa887418cb02adb1afd13759665045c6535919b3a56e37512e4906676dbefe048864e38735403cfa49590daf38f6f1376eae1ae33aefa4a9ed52b404284a105e5b57abe5ab91a047674418a7a4e57d47fa63b98aa6503e81b9cdd25f6bd7c168e52573245ad83b95a893ac4a442a474", 0x84}], 0x2, &(0x7f0000000640)="fd6ae92f9efad87717fb44dd4a29081771e8780f808c24bccb0a", 0x1a, 0x4000000}, 0x24044851) 6m4.753638016s ago: executing program 1 (id=25659): bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1a000000040000000000000001"], 0x50) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000070000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) r4 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000880), 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8946, &(0x7f0000000040)={'veth0_vlan\x00', @random='\x00\x00\x00\x00\x00 '}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r5}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0xcc}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x10, '\x00', 0x0, @sock_ops}, 0x94) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x800, 0x0, 0x0, 0xffffffff}, 0x0, 0xc, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={0xffffffffffffffff, 0x0, &(0x7f0000001780)=""/4096}, 0x20) r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/mnt\x00') ioctl$TUNSETIFF(r6, 0xb701, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0x17, &(0x7f0000000500)=ANY=[@ANYRESHEX=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYRES16=r0, @ANYRES32, @ANYBLOB], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x541b, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x89b1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='&\x00\x00\x00\x00'], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 6m4.653834169s ago: executing program 1 (id=25661): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x0, 0x8, 0x95, &(0x7f00000014c0)=""/149, 0x40f00, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000025c0)={0x3, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3ff}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@map=r0, 0x22, 0x1, 0x100, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140), 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1300000010000000020000000000000000000002", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000180)=[0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000280), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x17, 0x8, &(0x7f00000005c0)=ANY=[@ANYRES32=r5, @ANYRES64=r4, @ANYRESHEX=r2, @ANYRESDEC=r6, @ANYRESOCT=r4, @ANYRESHEX, @ANYBLOB="e3b8cda71aee998593b58dfebce4bb5e6e202f764f16e0de75d643cce6a41c76d20e5d5760993d9d12dbdd291023d0e47964d068e15a3bd07799815f5f792fc66b3ca1162c827d2a6793", @ANYRES64, @ANYRES8=r6], &(0x7f0000000200)='syzkaller\x00', 0x200000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x10, 0x1080}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@bloom_filter={0x1e, 0x1, 0xff, 0x1, 0x2, r1, 0x6, '\x00', r6, r7, 0x0, 0x5, 0x2, 0x3}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x28) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[{}], 0x8, 0xd, &(0x7f0000001f00), &(0x7f0000002080), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001158000000000000800000850000006d00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r10, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) recvmsg$unix(r9, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 6m3.74232182s ago: executing program 1 (id=25675): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x8c, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x2, 0xc, &(0x7f0000000040)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x59}}]}, &(0x7f0000000280)='syzkaller\x00'}, 0x94) 6m3.618661064s ago: executing program 1 (id=25676): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="6f7265746170f62038"], 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071104500000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[], 0xfffffdef) r3 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x6, 0xff, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000080), 0x619, r5}, 0x38) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0, 0x8, 0x0, 0x0}}, 0x10) r6 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000080)={'nicvf0\x00', 0x400}) ioctl$TUNSETTXFILTER(r6, 0x401054d5, &(0x7f0000000380)=ANY=[@ANYBLOB="4504"]) r7 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={0xffffffffffffffff, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe4, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), 0xfffffffffffffffd, 0x0, 0xb4, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x16, 0x3, &(0x7f0000000000)=@framed={{0x4e, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x51}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) write$cgroup_pid(r8, &(0x7f0000000980), 0x20000992) 6m2.933043757s ago: executing program 1 (id=25684): r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x4, 0xbd, 0x4, 0x7, 0x0, 0x81, 0x400, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x90a2, 0x5, 0xfffff0cd, 0x8, 0x8, 0x55, 0xa2a, 0x0, 0x80000000, 0x0, 0xfffffffffffffff1}, r2, 0xa, 0xffffffffffffffff, 0xf) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x4, [@var={0x2, 0x0, 0x0, 0xe, 0x4}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}, @fwd={0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x60}, 0x28) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0xa00, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x2, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40000000}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0xa, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x94) 6m2.106874535s ago: executing program 1 (id=25696): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) (async) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000180), 0x12) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x2, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x2e, 0x2e, 0xe]}}, &(0x7f0000000480)=""/171, 0x29, 0xab, 0x1}, 0x28) r3 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r4 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}, 0x0, 0x0, 0x49, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0)=r4, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000400000000180000000000000000000000000000009500000080000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000e8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r5 = openat$cgroup_freezer_state(r0, &(0x7f0000000080), 0x2, 0x0) write$cgroup_freezer_state(r5, &(0x7f00000000c0)='FROZEN\x00', 0x7) (async) write$cgroup_freezer_state(r5, &(0x7f00000000c0)='FROZEN\x00', 0x7) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_macvtap\x00', 0x2000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) (async) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYRESDEC=0x0], 0x0, 0x41, 0x0, 0x0, 0x403}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)=@generic={&(0x7f0000000180)='./file0\x00', r7}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)=@generic={&(0x7f0000000180)='./file0\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x29b, &(0x7f000000cf3d)=""/195}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x29b, &(0x7f000000cf3d)=""/195}, 0x48) 5m46.640141358s ago: executing program 34 (id=25696): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) (async) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000180), 0x12) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x2, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x2e, 0x2e, 0xe]}}, &(0x7f0000000480)=""/171, 0x29, 0xab, 0x1}, 0x28) r3 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r4 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}, 0x0, 0x0, 0x49, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0)=r4, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000400000000180000000000000000000000000000009500000080000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000e8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r5 = openat$cgroup_freezer_state(r0, &(0x7f0000000080), 0x2, 0x0) write$cgroup_freezer_state(r5, &(0x7f00000000c0)='FROZEN\x00', 0x7) (async) write$cgroup_freezer_state(r5, &(0x7f00000000c0)='FROZEN\x00', 0x7) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_macvtap\x00', 0x2000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) (async) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYRESDEC=0x0], 0x0, 0x41, 0x0, 0x0, 0x403}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)=@generic={&(0x7f0000000180)='./file0\x00', r7}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)=@generic={&(0x7f0000000180)='./file0\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x29b, &(0x7f000000cf3d)=""/195}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000000c00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x29b, &(0x7f000000cf3d)=""/195}, 0x48) 54.14152719s ago: executing program 2 (id=29616): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104046, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0x8, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@map_fd, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x5}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b000000050000000004000009000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/11], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x20, &(0x7f0000000200)={&(0x7f0000000080)=""/49, 0x31, 0x0, &(0x7f0000000180)=""/88, 0x58}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110cbece429e599950300e14ca000000000006301380000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) 53.902880207s ago: executing program 3 (id=29617): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8}, 0x180, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x4000000000000, r0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x7fffffff}, 0x48) (async) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r6) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x10040) write$cgroup_subtree(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce818d033200fefdfff500000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 53.902288037s ago: executing program 2 (id=29618): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) socketpair(0x1d, 0x3, 0x0, &(0x7f00000002c0)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(&(0x7f0000000000)='./file0\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') 53.885004389s ago: executing program 3 (id=29619): r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x0, 0x6, 0x7, 0x3, 0x0, 0x3, 0x84400, 0xe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0xdcb7}, 0x4000, 0x0, 0xffff7fff, 0x9, 0x221, 0x5, 0x9, 0x0, 0x600000, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x3, 0x7, 0x10, 0x2, 0x0, 0x0, 0x80014, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x1, 0xa, 0x8, 0x5, 0x8, 0x3, 0x75, 0x0, 0x4, 0x0, 0x8}, 0x0, 0x5, r0, 0xa) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'freezer'}, {0x2d, 'net_cls'}]}, 0x17) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x4) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)=@generic={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x18) r4 = syz_clone(0x18000, &(0x7f0000000280)="8e47c13e88eb0204df29031d1fd1adf8b40b6dfc4edcfb46914854d2b2f6ad6a2306d511c13453a751bf69f088c9783b28b86aba8260e7ab75cd667027637b5813f1cb01c1d25aed98057defe910e24ed8f5865646e83f2682e0d62bdef913c84ddd4e313c0de87b41e613cbf08e278c29fb92db76dbab032d56f0059369e142810c6ed0a52b2afe322858a856b41ab03eafbb37e9500f116acf4d451c9bebc2110c636d7923ad38ced9bbf5c8d84e544f2111c6b76ea430a03789575d577f3b4dec493692997fb2a59df79d4d0a136724783ebf9a6c87b9cbd51b", 0xdb, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="377a93381e0eaa82d10c1f8e3c687419f4d15a1a591192b61f3838d42a9d3e3f2a203982e703c3729ac5a347dd2e571808127b0464a8f7e84e55cea3296582652d63f263c3d6eb58314263") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r4, r3, 0x0, 0x1, &(0x7f0000000480)='\x00', 0x0}, 0x30) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xca6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)=r3}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000880)={0x1, 0x58, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$ITER_CREATE(0x21, &(0x7f00000008c0)={r2}, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0x20, &(0x7f0000000ac0)={&(0x7f0000000980)=""/247, 0xf7, 0x0, &(0x7f0000000a80)=""/8, 0x8}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000b40)={0x1, 0xffffffffffffffff}, 0x4) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b80)={0xffffffffffffffff, 0x1}, 0xc) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x1f, 0xb, &(0x7f0000000640)=@raw=[@map_val={0x18, 0x1, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9490, 0x0, 0x0, 0x0, 0x7}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}], &(0x7f00000006c0)='GPL\x00', 0x81, 0xee, &(0x7f0000000700)=""/238, 0x40f00, 0x4, '\x00', r8, @fallback=0x6, r9, 0x8, &(0x7f0000000900)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x3, 0x9, 0xfffffffc, 0x80000000}, 0x10, r10, r3, 0x7, &(0x7f0000000bc0)=[r11, r12], &(0x7f0000000c00)=[{0x2, 0x2, 0x9, 0x8}, {0x2, 0x5, 0x5, 0x3}, {0x1, 0x3, 0x7, 0x3}, {0x0, 0x3, 0x7, 0xa}, {0x2, 0x1, 0x0, 0xa}, {0x4, 0x4, 0x5, 0x1}, {0x3, 0x1, 0xe, 0x9}], 0x10, 0x5}, 0x94) ioctl$PERF_EVENT_IOC_RESET(r9, 0x2403, 0xff) ioctl$TUNSETTXFILTER(r12, 0x400454d1, &(0x7f0000000d40)={0x1, 0x9, [@remote, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, @multicast, @empty, @empty, @multicast, @broadcast]}) r14 = openat$cgroup(r9, &(0x7f0000000dc0)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d80)={@cgroup=r14, r13, 0x18, 0x2000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f80)={r6, &(0x7f0000000e00)="e51a1d28c614b17663ee619f31b67cea848309aadf47db984aec7ddce6a4029980b055b2ab36e844878fa88d4161686c0efdf74e50b6bd293bc3f9bc66861668e1fec96e4a6ee86589430c6540b591e059522f99ed9697fc4a16d17de67d08a49948f33250", &(0x7f0000000e80)=""/225}, 0x20) sendmsg$inet(r9, &(0x7f0000002500)={&(0x7f0000000fc0)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000002400)=[{&(0x7f0000001000)="360678e3fff5e7aa57e12a6419d5119e515f3ddd95d853ad3a3c189e33a4545363ecc2b773fc2578ff8ea48f106889b2792b9d24f9ea7971983e5a4554b07c2591c002009e9abd28e939407de75c11f435acb1ea65c9d4695870de150fa7733ab8e1c1ac5f6b04bb4738f3b4fa388c7aad3f68c87783e8b6", 0x78}, {&(0x7f0000001080)="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", 0x1000}, {&(0x7f0000002080)="efab821521fac2563b61941ddf288189f0a9fa59ba5182420616d73333f04cd9a227c7afc305d743e01115641f149f6f00d04c948303fa4b84bdf1d1a895dc2def070dc0fb5490e6731f14b41d6764fc7519a72576031538e5aab419ce6ad2eab76067a9cf9544a61dcbb4b4f73576bed2c39e37be195614029b7720a196c7bc", 0x80}, {&(0x7f0000002100)="c7c1233425efd6791f410d30493d40b04217b8dfa38f208fe84f0753f7eb61d9fcd497f139a947feb4ac2e9592f6c75dd35090a21218fbec317ff26fddc14d3ca5d53b19b1c75472c3845c76ca7dbc4271031b530975061805207ffe3483a6ce86f7c4650f7af1f9b5ce7319015bbc53e70eaa60ab46c9762b75d2c8ec86f19cc55665df706c35", 0x87}, {&(0x7f00000021c0)="d179a92cd425e08fe9c0bf1d8fffb735c34a14e48ed0535838b7caa723acba1a2ad356776bea5b0fd92d31dc111ffa9760947c26065ebe36b8edb687ee782f76caf61658152a6e2add97bf672a1dd46c3fec3c3e0a14309d2a0dddbde2c5394052ff8c544962f4c63ff56910f91529d863883ee6cef53789e79a4e6ee8424a7a45074e53d44422877bba084ead30bc56026ad72e021454efbe510a6703c62308f2bbde", 0xa3}, {&(0x7f0000002280)="1a1c592bd86ca3a8bce9b0dd96f04bc8cdd91a1a72e90416d85d22e3b26974c82006060d69a4195f051ebd6c603c99736415e375", 0x34}, {&(0x7f00000022c0)="4ee5767188062ece0f19cea913ba3fd021d6c94a9de729ac5309e4c0b1c7860f0b2ebee7fd80d1a7c8221755506bf93a2792dda8ab91cecd45b237c49f6ad98f0dda337faf7da890bbe229321fc6b8ea6e3f95212224e9a15c8f6f856fc2d020de521b1733183132e82e2dc67e517d3e32d53d6f4ae5c2db2b4c69ec33d220fb48fcfceec8dde53964ce82206c14f49415f9298d2ca2b31bf926f99e82d67a255d353d77d3880f", 0xa7}, {&(0x7f0000002380)="3b84331e0c5fb9eae05672f65561953f7618612e2762614e24bbfedff1d6288b5705f636b51b1c958ddbdc723e13d704b061ff49a321579ff25f6fb05a8e8386e7302e1c0d6124b76f24dfb90ff13b89443a2bfd3f1d38a1124f07a9a0eddb8a1df5860490048f9eecc969736808cae4b0c0e2bc023d84cd05", 0x79}], 0x8, &(0x7f0000002480)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x30}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x999}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3ff}}], 0x78}, 0x40010) perf_event_open(&(0x7f0000002540)={0x5, 0x80, 0x5, 0x2, 0x8, 0xf8, 0x0, 0x8, 0x50521, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9fd, 0x2, @perf_config_ext={0x1, 0x200}, 0x10, 0x4, 0x900000, 0x2, 0xa, 0x10, 0x7, 0x0, 0x7ff, 0x0, 0x1}, r4, 0xb, r0, 0xa) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000026c0)={@fallback=r1, 0x9, 0x0, 0x8, &(0x7f00000025c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000002600)=[0x0, 0x0, 0x0], &(0x7f0000002640)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002680)=[0x0], 0x0}, 0x40) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0xe, 0x1c, &(0x7f0000002740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8eef}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x0, 0x6, 0x4, 0x4, 0xffffffffffffffc0, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @generic={0x44, 0xe, 0xd, 0x4, 0xc3d5}, @jmp={0x5, 0x1, 0xd, 0x4, 0x0, 0xc, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002840)='syzkaller\x00', 0x101, 0x0, 0x0, 0x41000, 0x51, '\x00', r8, @fallback=0x2, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002880)={0x5, 0x2, 0x0, 0xa6dd}, 0x10, 0xffffffffffffffff, r3, 0x6, &(0x7f00000028c0)=[r7, r11, r6], &(0x7f0000002900)=[{0x0, 0x4, 0x7, 0x2}, {0x1, 0x1, 0x8, 0xe}, {0x5, 0x5, 0x8, 0xa}, {0x1, 0x5, 0xa, 0xa}, {0x4, 0x1, 0x5, 0x5}, {0x2, 0x1, 0xa}], 0x10, 0x8}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000002700)={@fallback=r14, r6, 0x10, 0x0, 0x0, @void, @value=r17, @void, @void, r16}, 0x20) r18 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002a40)={r5}, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r18) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000002a80)) bpf$PROG_LOAD(0x5, &(0x7f0000003180)={0x15, 0x13, &(0x7f0000002b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r15}}, {}, [@map_val={0x18, 0x9, 0x2, 0x0, r11, 0x0, 0x0, 0x0, 0x81}, @map_fd={0x18, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002c00)='syzkaller\x00', 0x0, 0x93, &(0x7f0000002c40)=""/147, 0x41000, 0x40, '\x00', r8, @fallback=0x18, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002d00)={0x3, 0x0, 0x33a4, 0xf}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000003140)=[r11, 0xffffffffffffffff, r11], 0x0, 0x10, 0x10}, 0x94) 53.737481363s ago: executing program 3 (id=29620): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0xbe5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x56}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000fc0)=' \xb4\xcfhj0\x04\x9e\x92\xee\x87\xa1X\xbb\xea/\xbe\x18\xeb\xa9\bsDi\xb2\xc6E\x14\x8a\x1d\xc0\xd9\xe6\x10\xc0s\xe8\xc1\x12\xbd\xe2tX}\xa3\x1e \xfady7D -\x96x\x81\xdb.?\x16\xbb\x93\x1c') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x2, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18004c533c00000300000010850097c945d82f76794f964c94ac14d61bb34887057a"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_PROG(0x11, &(0x7f0000000240)=@o_path={0x0, r0}, 0x18) close(0xffffffffffffffff) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0xda, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf28, 0x0, @perf_bp={0x0, 0x2}, 0x400, 0x2000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x123c02, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40047438, 0x110c230041) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000001f40)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1C\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={0xffffffffffffffff, &(0x7f0000000780)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00Q\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000060000000000000000000500a00000145b452569a7af970000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 53.442620673s ago: executing program 2 (id=29622): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f00000002c0)={&(0x7f0000000280)=""/15, 0xf, 0x0, &(0x7f0000001380)=""/227, 0xe3}}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pimreg0\x00', 0x7c2}) r1 = perf_event_open(&(0x7f00000010c0)={0xd4c9df145496c795, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x200, 0x6420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="4e884b03dff7af4a080000000c00000300000000def8910009ada579332ec7e4dab5527690c99a6c1a03bc18a8c0a8fb715a20a97e553603da94d8df07f2363348f424d7932cf4fb3815292b6d9af6b770b640e4d5fccf080450c8e96bd9cb1379230d5d922b15762609c760afa6b6cc65c09c04212543002de1eabc1863c280e1604a05ab80db7d2e2279f6378df709be362a4807e2aeb76f5c6c74cb220e86bebd33a88c2f238130c4f54212e62e35dbaef192a113e30fc787d4a4f08cf6e64ee6cee0d07c6d33c163e789119695a895f9a4423a6dae9335cac2bbdea8207db6f83e266c43a30889c3a6261356b3210448b74e70", @ANYRES32, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={0xffffffffffffffff, r4}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r6 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x4, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000da1e0000000000000700000018630000040000000000000007000000950000e10000000085000000250000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x59, &(0x7f0000000b80)=""/89, 0x41000, 0x60, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000c00)={0x7, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000c40)=[r4, r4, r4, 0xffffffffffffffff, r2], &(0x7f0000000cc0)=[{0x2, 0x1, 0x0, 0xc}, {0x0, 0x4, 0x6, 0x7}, {0x0, 0x3, 0xc, 0xa}, {0x4, 0x1, 0xe, 0xc}, {0x4, 0x2, 0x1, 0x2}, {0x3, 0x5, 0xf, 0x4}, {0x2, 0x1, 0x8, 0xa}], 0x10, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000ec0)=ANY=[@ANYRESOCT=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, r8}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f2, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x8, r1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x0, 0x0}) syz_clone(0x2100000, &(0x7f0000000080)="fe6f697ddca261961cbc51e7d4f8daa757c26fe248b976df8e11be551f4aad124e6d5e01c812f38028ab66bb71df29b908f0bb72a9a18d60b172aa8203233b2ce97127229fb6f47d85c9039253cc2e5beee857758d2bb93447a7e7c17277c358755f303f76c06e654bf3ea9d249f46e91a55cedddb0f7f32f1cf3c76673f6f315a957cbc05ed10e39a811efe427b16a2a551b5ef6589206c048e91469250fa6de703134842f879a3a6e37c05eb71d62280b4fe4b5c430a120cdf4c3eded3b336548361d14cbb", 0xc6, 0x0, &(0x7f0000000200), &(0x7f0000000380)="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") 53.128050664s ago: executing program 3 (id=29624): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000400)={'ip6erspan0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000300)=@base={0x8, 0x1, 0x4, 0x400bf22, 0x200, r3, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180)=r5, 0x4) sendmsg$inet(r7, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x100}) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_subtree(r11, &(0x7f0000000600)={[{0x2d, 'devices'}, {0x2d, 'freezer'}, {0x2b, 'memory'}, {0x2b, 'pids'}, {0x2b, 'cpu'}]}, 0x25) ioctl$TUNSETSTEERINGEBPF(r8, 0x800454e0, &(0x7f00000000c0)=r10) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000500)=r0) write$cgroup_devices(r9, &(0x7f0000000580)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 52.763914046s ago: executing program 7 (id=29625): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0400000000000000000000006703000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073010a000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 52.758490896s ago: executing program 6 (id=29626): write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x309) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = gettid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3}, r4, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0xff, &(0x7f0000000040)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000380)={0xfffffffffffffffe, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="5aa40db80d601c31b90531cbd507b99f5b36ac4ee1de85ab7ac538e7cd3e07d0ca01ce0f5916a7b55c82f091ea0b5407f844a5f5954ad76aaf71b61e0b3961fb74e4939e919f49e8c22e252c47f629164c4ba0d7f6b30a91c68e34f07e4f8cc6b820482e493d50c4bc23ed9874ffc658a4036afa211e1bbdf8813426715f1d6993b530", 0x83}], 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 52.591635902s ago: executing program 5 (id=29627): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x13, 0xfffffffd, 0x8, 0x8}, 0x50) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000037c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x100) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000000053000000000000000008000000000055afd2ac72c21e1a5451239327ccdc788b", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x15, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000fcffffff000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b70600001fffffff8500000005000000bf09000000000000260901000000000095000000000000002c98000000000000bf98000000000000080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 52.555557614s ago: executing program 5 (id=29628): r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000100)='[^*\x00'}, 0x30) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xef, 0x3, 0x0, 0x0, 0x0, 0x0, 0x28264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_config_ext={0x8000000001eb, 0x10001}, 0x2018, 0x0, 0xfffffffc, 0x2, 0x0, 0xa, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8088, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={r1, 0xffffffffffffffff}, 0xffffffffffffffe4) r4 = perf_event_open$cgroup(&(0x7f0000000340)={0x3, 0x80, 0x7, 0x6, 0x7, 0x1, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xdca4, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x108, 0x3, 0x3b6a, 0x1, 0x9, 0x6353, 0xd, 0x0, 0x5, 0x0, 0x48d}, r2, 0x10, r2, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={r3}, 0x4) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x4, 0x4}}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000900)="cc03f6a1136da0d61b17d0fd780be1afb0c2681f0a554cf271405cc3364debdf539afc2919ed4b4f4bde318dc629cde821e7c4f7450a15fd7a9b5601e6abe1776ae22c03bc4082319c8213a7398f65edfb1366128369add16cb6a025f1e0f4d400b6016445de1fd01b08fb4d014f863ddca0366c9149126590a77066b2f3b6c562351bb00f7c0f8e18d755513154593656e30273138968be7e65a29cbe3e1b522bd777403fb57a1baa0512020faf67d9def4a8c1783bdaa72953e595dd42acef1902077c63cc03", 0xc7}], 0x1, &(0x7f0000000a40)="953fb59f786a25c45df800c95975897649f3be84fee99dc20584783cea07fc7445f3c2399123373d1404e9212b63ed4b4a7862fc8bd61fe70c8a63c1dada4e5202fb180b6ce9987027ab6d02334a07990d38e8506ff5f06b807765da9b05cfd722659ce177ebee1560ce3a7e04b8f2aff3afb8e93f3b99a22ec738b93a79ed7961ca27fa4d0944ebee079ae3b54c4d6d4b6789bd258d9e8c792646ad51ca8aae9dc77d4665884691a905e66434aa69df9f4d3ed05dbbe381370bff5019c950c4936e26103aadc97ba33a6601", 0xcc, 0x48084}, 0x50) r5 = perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0xfd, 0xbb, 0xb, 0x0, 0x8000000000, 0x450e2, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000000), 0x9}, 0x1101, 0x6, 0x2, 0x8, 0x9, 0xcb4, 0xbe, 0x0, 0x3ff, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x1, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x400000002, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8000000000000000, 0x5}, 0x4130, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfff4, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, r6, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x2}, 0x0, 0x0, r6, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x2301, 0x2000000, 0x0, 0x0, 0x40000000, 0x6, 0x8, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, r5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x10, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="887b8b8ec6ed0ab00b99145a6bd6f06fbe155d875d73c45a348ff9f591181c1db02b3f23c72e0847e0b5616267f46f4ac965de485e531fac1f19e8027a7b1b2937f93cc6f636c7a0c553bfadd71e6fe52a726279d73add13c2b7a1df4bcad74b1cf5959f523f12fa82923711cfba900e4ddb495cc02b42c1da654e659c60f25e29a3d69db8e6100e0445bc530f138e8adf28ac8b23422793983876a4c7dd5b44218e"], &(0x7f00000003c0)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x9}, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001d40)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)}, 0x0) recvmsg$unix(r7, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@cred={{0x1c}}], 0x20}, 0x0) 52.554361174s ago: executing program 7 (id=29629): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x100009, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x29}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x0, 0x0) r5 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) r6 = gettid() r7 = getpid() r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000000400000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r9}, 0xc) r10 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000001280)=ANY=[@ANYBLOB="0400000004000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000060000"], 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x40}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$unix(r13, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004dc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r12], 0xf8}, 0x51582b7d7fa95902) r14 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) r15 = bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0xa, 0x42, 0x40, 0xc2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r16}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r16}, 0x38) r17 = getpid() sendmsg$unix(r2, &(0x7f0000000580)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000140)="415989f29d5406926aaa9a414703a5a76d6f50917dc9eb4529998b1f3860cae9109e6a0bcc69e56f6b093c2f16ddba34bf86e58f81cb0a64caf0963f22ade89b25769d62fcb3486d35965610d2b8b484e1573ac5ba390f1fc7cda8013d3966d4b9c4d8db67f33b31d0e91391f368e22fba01d54634afa3148a46b778df142eaa7b8064255643705d6c9d7557fae7cf686a6f56465731753e0fb898e7b2a4cf16284cb8cf1b563cfa0ac439a66d93efbf6fae996418205cc3a1", 0xb9}, {&(0x7f0000000200)="4201f41b94094c302b655869784399518d5c3ead3a78d44b1a04f77342aa1307f437a2fe91e82439a850cf37", 0x2c}, {&(0x7f0000000280)="d5684304a0ea920d96975ecfe7a39af1b4f2221c9555db87debf11afbfe81302d6960d3c2040", 0x26}], 0x3, &(0x7f0000000440)=[@rights={{0x34, 0x1, 0x1, [r0, r1, r0, 0xffffffffffffffff, r3, r0, r0, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r1, r1, r9, r1, r0, r0, r0, r1, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01, r12}}}, @rights={{0x38, 0x1, 0x1, [r1, r14, r0, r15, r16, r0, r0, r0, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r17, 0xffffffffffffffff, 0xffffffffffffffff}}}], 0x128, 0x4a010}, 0x44840) r18 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020200008500000072000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r18, 0xfca804a0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r19 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r19, 0x0, 0x0) 52.37628931s ago: executing program 5 (id=29630): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x4, &(0x7f00000002c0), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004340)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xa, 0x2000000000000007}, 0x410, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000340)=r1, 0x12) sendmsg(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000002c0)="7cb34aa2", 0x4}], 0x1}, 0x40) close(0xffffffffffffffff) 52.36014767s ago: executing program 7 (id=29631): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000001040)=ANY=[@ANYRESHEX=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0}, 0x94) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=ANY=[@ANYRES16=r1], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41100, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x6}, 0x94) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x49) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) close(r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10003, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r6, &(0x7f0000000000), &(0x7f0000001a00)=""/122}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x4, &(0x7f0000001800)={{r5}, &(0x7f0000001780)=0x4, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9f, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x73, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r3, @ANYBLOB="000000000000000000e600000008", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="01000000000000000500"/28], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x14, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 52.301316012s ago: executing program 2 (id=29632): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1ed1, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="0a000100160000000300000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000180)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000001c0)="d31caf4bbeef013bc0a2a535800257f0cb5ae419c2c55a652bccec9c0b6abc91707095b0b13e115e1347a9e8a5bb4dff66df6e8006d1dae4ff2518c8b142201801ac17e417c0ef373d838878b1471830bd52f77481cd6fcd", 0x58}, {&(0x7f0000000240)="96fedd5f5fcaa1e0966e6acfc04cead7e0bffacc2d97a774b6b5c9f014f48f81c99d0cecb98665280e6e9616b9cabef3cfa4e874788ae0c4cbc2f3a862247113b6f2815c0cfe9b42033db05ea6e1221e3e59db710fa62af1aa60f0cfe3a167be02ee95ddd8502395cf127f44a4e61d6bcde517555278aba1943f7725dc560d392b432920b92c02ff9efc8870a4ed1db39f0a", 0x92}], 0x2, &(0x7f0000000740)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @private=0xa010102}}}], 0x20}, 0x8000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x4, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3b81}, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xb4, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x7, 0x3}, 0xc27a, 0x40, 0x7, 0x5, 0x1, 0x200200, 0xfffc, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000002c000000000000001800e63f00000000000000000000000095000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0xfd, 0x0, 0x0, 0x40037, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0xfffc}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x3) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x410000, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x97}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f3, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000001240)='(pu&\"\"\t&&\x01\x97\x82\xbf\xab\xf9\x80\x82\xc9lY~\xa3\xdac\'/\x03\xa6x\x11\x8f\xe1\xc9\xe3\xb6\xb3\xf9\xac\xdb\xce\xaem<#\xa3K') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18006800000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') 52.150925837s ago: executing program 5 (id=29633): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x6, 0x4, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x85}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r7}, &(0x7f0000000280), &(0x7f0000000240)=r4}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r8, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1d, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, r8, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x3, 0x27, &(0x7f0000000940)=@raw=[@exit, @ldst={0x3, 0x3, 0x4, 0x4, 0x0, 0xfffffffffffffff0, 0x10}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9115}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x2b1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xdf4}}], &(0x7f0000000a80)='syzkaller\x00', 0xff, 0x44, &(0x7f0000000ac0)=""/68, 0x41100, 0x38, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000b80)={0x1, 0x1, 0x7, 0x8}, 0x10, r9, 0xffffffffffffffff, 0x2, &(0x7f0000000c40)=[r3], &(0x7f0000000c80)=[{0x3, 0x4, 0x8, 0x5}, {0x0, 0x4, 0xb, 0x6}], 0x10, 0x1}, 0x94) (rerun: 64) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r3}, &(0x7f0000000640), &(0x7f0000000680)='%ps \x00'}, 0x20) (async) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000000c0)=r10, 0x4) sendmsg$inet(r6, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)='D', 0x33fe0}], 0x1}, 0x20000040) (async) sendmsg(r12, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) (async) close(r11) (async) bpf$MAP_CREATE(0x0, &(0x7f0000002400)=@base={0x9, 0x4, 0x7fe2, 0xffffffff, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1f, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000080000080000000009000000731158000000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) 52.149963107s ago: executing program 5 (id=29634): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000071120e000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0xffffffffffffffb1, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x40) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b004000801df68502ef3f84b551208397ed0fff4cfcf11cde149eabadd112221f65", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x5, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f00000019c0)=[{0x4, 0x1, 0x400, 0x3}], 0x10, 0x7}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001a40)={r2, &(0x7f00000019c0), 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x20, &(0x7f0000000340)={&(0x7f0000000040)=""/10, 0xa, 0x0, &(0x7f0000000240)=""/243, 0xf3}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 52.140702147s ago: executing program 5 (id=29635): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) syz_clone(0x100, &(0x7f0000000380)="df8516a30b2c9de5c0590411c36d792917c506535403f9ba17c0ac0022857cfb5fa4f7656ec836aaddeb1f7af460a77edd321b7834cb93eb100143f25d1f43df21e09bd762612e8c54bd01d015b753f949d37df304de1c23488de23c4e73db6b0807cc67a209be415b44724ba9b2d89d7942e271efc7f7d4d881ba30b5f67b751b0939cad7c65fbcbedab16786b7625deb40289b", 0x94, &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)="a5e5255cf8f319155bc2382bf45c7f61fec5b1809e8211f1cbe9dc6d5b0f13a50feb9f9dffbb89c01173630f4cabb78ec81fa3e76edc6d6b6408e84e860436533ee3841137687e60f8252f1b4e2b29db7226d80cbc2ede650796785ff30232be733b1b542d04142f035d513327cc814507c696d6131c20905974bb01ea52205031344112a5177cd13e230cebe5ad7b6770e2d7405fe4ca759d25464d7eee5e719e09041c50ba5abd907171d332d81224607f002ab3fef01ec6ef2961") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="b9ff030f6044238cb89e14f088ca", 0x0, 0x2b, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = syz_clone(0x92260000, &(0x7f0000000580)="43082647101fb2b00533391868601c60f0985a2883f6c186ebe454954e562f7a5dbd2bdc5a21282befd78c772e89932f92a938fec514a3cd838d699659381523d6823fc07de552b1730922c2d6996f44dfd189da37fc8eebb28a10b411567fc533b8f022d2e26c2ca300b21b9321506fafbcd9cbd57839cf9506f3bb47b15ca9c7dcdb15f47e6cb557971e4cbe5904493942f804e9253ab94f7ad2cddcd3d8bb13c57913e6760da89ade04dee86e96c807b9565f999a3ac56422572492d837eaef6be5a81fab90223e71d2c75d6220bd79e2e4091f0c9b362533e775da5ae468ca42beb1aadd4d", 0xe7, &(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)="4b7ff56e06ad9fcf4bc12b1ddc99dd97453ee580e17b9f379b4860e52f118f") perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xc, 0x8, 0x81, 0xe9, 0x0, 0xfffffffffffff800, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b, 0x1, @perf_config_ext={0x10001, 0x1}, 0x1, 0x40, 0x7, 0x8, 0x62b8, 0xfffffffe, 0x5c66, 0x0, 0x5, 0x0, 0x6}, r5, 0x9, r2, 0x2) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000, 0x0, 0xffffff64}, 0x2c) 52.139682447s ago: executing program 6 (id=29636): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) sendmsg$sock(r2, &(0x7f0000000800)={&(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @multicast1}, 0x2, 0x2, 0x4, 0x3}}, 0x80, &(0x7f0000000600)}, 0x20000001) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000a0000000500000007000000c1000000", @ANYRES32, @ANYBLOB="02000000000000002000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r3, &(0x7f0000000140), &(0x7f0000000280)=""/255}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB='&\x00\x00\x00* \x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"/313, @ANYRES64=0x0], 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000050114c0000000000850070471c0000009500000800000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x11, 0x38}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r5, 0x0, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000038e9bdbde3c804d8096023e0e0a27436000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000a0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) write$cgroup_int(r7, &(0x7f0000000400)=0x4, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x0, 0x10, 0x10, &(0x7f0000000080)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x30) 52.087893879s ago: executing program 6 (id=29637): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x8, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000040), &(0x7f00000002c0)}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) (async) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$MAP_CREATE_TAIL_CALL(0x9, &(0x7f0000000cc0)=ANY=[@ANYBLOB="030000000400000004"], 0xc) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, r1}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000013c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x13, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2}, 0x50) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r5}, &(0x7f0000000380), &(0x7f0000000400)=r3}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r6, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a40)={{0x1, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000a00)=r2}, 0x20) mkdir(&(0x7f0000001380)='./file0\x00', 0x14) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@bloom_filter={0x1e, 0x6b3, 0x1ff, 0x2ad, 0x62, r8, 0x8, '\x00', r7, 0xffffffffffffffff, 0x4, 0x2, 0x5, 0xd}, 0x50) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x80000000, '\x00', r7, 0xffffffffffffffff, 0x1, 0x1, 0x5}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xc, 0x0, &(0x7f0000000480), &(0x7f0000000500)='GPL\x00', 0x8, 0x3f, &(0x7f0000000540)=""/63, 0x40f00, 0x4, '\x00', r7, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000680)=[{0x2, 0x1, 0xb, 0x64d2345aebd78a1e}, {0x2, 0x1, 0xf, 0x1}, {0x5, 0x3, 0xa, 0x4}, {0x3, 0x2, 0x3}], 0x10, 0x59}, 0x94) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000006000000090002000000000a03000000090000000000001205000000205f615f3000"], &(0x7f0000000180)=""/12, 0x36, 0xc, 0x1, 0x401, 0x10000}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001300)=ANY=[@ANYBLOB="1b00000000000000000000000900000000000000", @ANYRES32=0x1, @ANYBLOB="0400000000000000000000000000000000100000", @ANYRES32=r7, @ANYRES32=r9, @ANYBLOB="010000000400"/28], 0x50) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000001b80)="b7ecfd97f45055fa298b59ac8a32ed85bf830008c1cc057e069c4e0170110190c7476a2d5503727016bd35632eb5e1e917acd85943000000000000000000001bb79618c5ceb006eb55b3daa9c5", &(0x7f0000001ac0)=""/176}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{0x1}, 0x0, 0x0}, 0x20) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x6, 0x10, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r11, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0xdc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x89a2, &(0x7f0000000040)={'bridge0\x00', @random="0400"}) (async) close(r12) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x94) (async) perf_event_open$cgroup(&(0x7f0000001480)={0x0, 0x80, 0x1, 0x2, 0x1b, 0x1, 0x0, 0x8000000000000000, 0x1c01, 0x11, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xf4d, 0x1, @perf_bp={&(0x7f0000001440), 0xa}, 0x4040, 0x3, 0x5, 0x4, 0xfffffffffffffffd, 0x2, 0x1, 0x0, 0x10, 0x0, 0x418}, r4, 0x4, 0xffffffffffffffff, 0xb) 51.990519242s ago: executing program 6 (id=29638): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) sendmsg$inet(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r6, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x2, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r7, 0x0, 0x10}, 0xc) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'batadv0\x00', 0x2}) 51.715807611s ago: executing program 3 (id=29639): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x1b, &(0x7f00000001c0)=[{}], 0x8, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x1d, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x13, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @fallback=0x1b}, 0x94) 51.695288462s ago: executing program 3 (id=29640): bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xcb13119f635c50e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000009800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0xa, &(0x7f00000002c0)=r2, 0x4) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000003100)=[{&(0x7f0000000100)="ede750d3497d60d368e5eb", 0xb}], 0x1, 0x0, 0x0, 0x4}, 0x40012) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000006c0)={&(0x7f0000000140)="2401ab1730ef5b92c1a216c49581521caae31dbd4ff1e6b5a5ec1273a475a4d9d8f4e0c16cb81280d0c1c1e030c054845d9b02794ada5708a3cc322bfea0ede603a252363f1011b0e921f0acd640f85ae6f887bae301ff1acd7188976ac9cf2a0fc5db57bb4e9cea5c4c3e422f06ad621f37361c04fcd457380e35169daef58ad5c0fd314836499d89e125da7898640b8186bb1a804fe325c8ad1528f569a995ce5e0e32ed2bd6", &(0x7f0000000300)=""/189, &(0x7f00000004c0), &(0x7f0000000500)="6952ead07a7810b3ea235e01c70ed44bb4771de3348953bd63f0d83f3b547f4569388397aec9a532f0feb85943466430e7dcda21c2681797aeeb0d5613845b0074df353942ac57426ac8805f0a1783fa8b4550acbe549602145ad9212f047a4403e879535fee965e31bb75241871b05327e6afb2aa561b36a59457b6acff0029810c46", 0x2, r7, 0x4}, 0x38) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r8) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 51.583034926s ago: executing program 2 (id=29641): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) socketpair(0x18, 0x2, 0x1, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="ac000000000000fb"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e0000000400"/20, @ANYRES32=0x1, @ANYRESDEC=r4, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r9) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0a00000002000000010000002300000000000000", @ANYRES32=0x1, @ANYBLOB="03000000000000000000000000007e0000000000af75bcba0e5afb55a197e81cd5cc6a116de9a7a63716e35fd5eaad50cb1b76850af45b5187d257fdde645e4e1f73e3f876bcc938e4b31d03604e4e6421b27419b8a258987e33dd5e85607da0a243a6f2b48273bb2277689a8221167435087345a7d13f6eba86", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b702000040000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$unix(r8, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000100)={0x0, 0x0}) close(r13) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r14, 0x10f, 0x87, &(0x7f00000002c0)=r12, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 50.155706944s ago: executing program 2 (id=29642): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={0x1, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r0, 0x80000000, 0x18}, 0xc) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a7, 0x1a7, 0x3, [@enum={0xd, 0x5, 0x0, 0x6, 0x4, [{0x6, 0x8}, {0xa, 0x1149}, {0x8, 0x7}, {0x1, 0x4}, {0xc, 0x1}]}, @enum={0x3, 0x5, 0x0, 0x6, 0x4, [{0x6, 0x8a}, {0x9, 0xfffffff7}, {0x2, 0x3}, {0x2, 0x7}, {0x10, 0x2}]}, @union={0xd, 0x6, 0x0, 0x5, 0x1, 0x1000, [{0x2, 0x4, 0x8}, {0x10, 0x1, 0x4}, {0x5, 0x3, 0x5}, {0x6, 0x1, 0x5}, {0x1, 0x8a5, 0x200}, {0x6, 0x2, 0xfffffff8}]}, @datasec={0xd, 0x2, 0x0, 0xf, 0x3, [{0x5, 0x80, 0x3}, {0x3, 0x5, 0x4}], "eca8bb"}, @enum={0x6, 0x8, 0x0, 0x6, 0x4, [{0x9, 0x4}, {0x10, 0x80000000}, {0x3, 0x4}, {0xe, 0xd7cd}, {0xc, 0x7}, {0x8, 0x6}, {0x6, 0x9}, {0xb, 0x3}]}, @restrict={0xc, 0x0, 0x0, 0xb, 0x4}, @const={0xf, 0x0, 0x0, 0xa, 0x1}, @func={0xe, 0x0, 0x0, 0xc, 0x2}, @struct={0xf, 0x6, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3, 0xfffffff8}, {0x4, 0x0, 0x5}, {0x9, 0x1, 0xa}, {0x9, 0x1, 0x7}, {0x5, 0x3, 0x5}, {0x0, 0x3, 0x8}]}]}, {0x0, [0x0]}}, &(0x7f0000000840)=""/149, 0x1c3, 0x95, 0x1, 0x10000}, 0x28) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x4, 0x1, 0xfad4, 0x40c80, r2, 0x2, '\x00', r1, 0xffffffffffffffff, 0x4, 0x4, 0x1}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=ANY=[@ANYBLOB="0b00000005000000070000000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000000000000000000000000ff00000000000000"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000b"], 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000000400000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000040)={r9, r7}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0xd}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @ldst={0x2, 0x3, 0x1, 0xa, 0x9, 0x10, 0xfffffffffffffff0}]}, &(0x7f0000000980)='syzkaller\x00', 0xeef, 0x1c, &(0x7f0000000a40)=""/28, 0x40f00, 0x22, '\x00', r1, 0x17, r3, 0x8, &(0x7f0000000a80)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x0, 0x40, 0xffffffff}, 0x10, 0x12e53, r6, 0x1, 0x0, &(0x7f0000000b00)=[{0x3, 0x4, 0xe, 0x7}], 0x10, 0x401}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002e00)={r10, 0x0, 0x38, 0x1000, &(0x7f0000000c00)="83462f5c513af320a7dd9483513379feb262bcc553ccaa44fdf3b6c5c27ca99738f2a5f29a5c3d9734020a772d26b713f71e2f942a1c2b2e", &(0x7f0000001c80)=""/4096, 0x7, 0x0, 0xfb, 0x64, &(0x7f0000002c80)="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", &(0x7f0000002d80)="880fed11329c75b09b2808565ccbfbc8c177771ebccd20cd03ab3212963b17b71ad8e703d5e47c8cb2275f43a49b941342b710e80733033900243f9e51b62bcd37029696002b0ad26fe9cdfc538d54b00e43befcb245470d0bd365d599e9ed65f0d3f288", 0x6, 0x0, 0x6}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xb2, 0x0, 0x0, 0x1, 0x0, 0xffffffffdffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8}, 0x0, 0x0, 0x1, 0x0, 0xfe2, 0x0, 0x20, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f1, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000100)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x59}}, {{0x5, 0x0, 0x5, 0x9, 0x0, 0x1, 0x40000000}}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x7b) 48.389927184s ago: executing program 7 (id=29643): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)='%pI4 \x00'}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000740)={r1, &(0x7f0000000600)="1b63fa8d01a69eaaee4ba7e7c197b77df585cf530b88aa2043652bb885f2145863e404002547f3fe557d9ed60ec635ef8d84e27534c9a6fa26624e3b36b01b96ac93a153cb2fddf73d45e0270af14e7bb2602fbb62a94713822ad10d045f53a5f0c7846e0bd0ddcc795a08e7b3ae47398d98a6276a395a0f82527d698db7b2fa0a851a4d9292f2dcdcc906a2accf9ffd91e487fe7b751fde7978896f862b22de546c4bb131b8e0900d934a90d431a53cd6c51572b75f10727bac3d14ce5bca047e9695a3b8ce49cf41768d220ff8cf8ae1be04", &(0x7f0000000700)=""/46, 0x4}, 0x20) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'hsr0\x00', 0x20}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/179, 0xb3}, {&(0x7f00000001c0)=""/69, 0x45}], 0x2, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x2000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000004073010500000000009500000400000000d4ffc96d7908ec3d764a35dafe7bf2eaea6a46faa3e756e012413100a31db0a8b36882d4f5170ac1f55a57e6a4e4930e4c611099c8a0e8cae95175eb5f2340f099865a1dc2d16d39be342e3a66ef7d221fa51c4aa5"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b4000000000000007b113a000000000046000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0xe, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 47.746526176s ago: executing program 6 (id=29644): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff000000007110a900000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x9, 0xffffffff}, {0x0, 0xe62b96d7}]}]}, {0x0, [0x30, 0x2e, 0x61, 0x2e, 0x30, 0x61]}}, &(0x7f0000000200)=""/101, 0x3c, 0x65, 0x0, 0xfff}, 0x28) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x9, 0xffffffff}, {0x0, 0xe62b96d7}]}]}, {0x0, [0x30, 0x2e, 0x61, 0x2e, 0x30, 0x61]}}, &(0x7f0000000200)=""/101, 0x3c, 0x65, 0x0, 0xfff}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xffffffff, '\x00', r1, r2, 0x2, 0x2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000007910b80000000000170000cbb27fcd45572e45be00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 45.164020483s ago: executing program 6 (id=29645): perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8124a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x2000000, 0x0, 0x7, 0x10000000004, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='cpu<-0||!') r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x301142, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000640)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1bd4000c"], 0xffdd) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) 43.714935212s ago: executing program 7 (id=29646): bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) r3 = syz_clone(0xa04080, &(0x7f0000000580)="574a0195df72e195e930462118b946301ce6b73c724f4a49d23cec4dbb45575fb4db326085df7176cf508de6503c230e3af90d860a01231e1f9fa2f9601ddc025feff8ecf0ffb530d488161c869225f9", 0x50, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, r3, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) (async, rerun: 32) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="82", 0x1}], 0x1}, 0x80) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000001000000000000010000000000000000000000000000000105000000100000000000000000000003000000000100000002"], 0x0, 0x53}, 0x20) close(r1) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000010000000000000000040000850000008900000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073013902000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x6, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) recvmsg(r0, &(0x7f0000002c80)={0x0, 0x0, 0x0}, 0x0) 42.722666166s ago: executing program 7 (id=29647): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ip6erspan0\x00', 0x10}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x1818, 0x2, 0x0, 0x0, 0x0, 0x1b24, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), &(0x7f0000000340), 0x619, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2, r1}, 0xc) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000400)=""/136) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000600)=0xd, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xb, 0x32, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x380e834a, 0x0, 0x0, 0x0, 0xde2}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x9}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x4, 0x6, 0x1, 0xc1e7, 0x2}, @ldst={0x1, 0x1, 0x3, 0xb, 0xb, 0xffffffffffffffff, 0xfffffffffffffffc}, @ringbuf_query, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x34987c179153ee28, 0x2, 0x5, 0x6, 0xfffffffffffffffc}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='syzkaller\x00', 0x3, 0xc8, &(0x7f00000002c0)=""/200, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r0, 0x7, &(0x7f00000004c0)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x5, 0x4, 0x3, 0x9}, {0x4, 0x1, 0xb, 0x3}, {0x3, 0x4, 0x8, 0x5}, {0x5, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x0, 0xa}, {0x4, 0x4, 0x3, 0x5}, {0x1, 0x1, 0x10, 0x4}], 0x10, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0xfffffffc}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r6, 0xf, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) 36.06375535s ago: executing program 35 (id=29640): bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xcb13119f635c50e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000009800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0xa, &(0x7f00000002c0)=r2, 0x4) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000003100)=[{&(0x7f0000000100)="ede750d3497d60d368e5eb", 0xb}], 0x1, 0x0, 0x0, 0x4}, 0x40012) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000006c0)={&(0x7f0000000140)="2401ab1730ef5b92c1a216c49581521caae31dbd4ff1e6b5a5ec1273a475a4d9d8f4e0c16cb81280d0c1c1e030c054845d9b02794ada5708a3cc322bfea0ede603a252363f1011b0e921f0acd640f85ae6f887bae301ff1acd7188976ac9cf2a0fc5db57bb4e9cea5c4c3e422f06ad621f37361c04fcd457380e35169daef58ad5c0fd314836499d89e125da7898640b8186bb1a804fe325c8ad1528f569a995ce5e0e32ed2bd6", &(0x7f0000000300)=""/189, &(0x7f00000004c0), &(0x7f0000000500)="6952ead07a7810b3ea235e01c70ed44bb4771de3348953bd63f0d83f3b547f4569388397aec9a532f0feb85943466430e7dcda21c2681797aeeb0d5613845b0074df353942ac57426ac8805f0a1783fa8b4550acbe549602145ad9212f047a4403e879535fee965e31bb75241871b05327e6afb2aa561b36a59457b6acff0029810c46", 0x2, r7, 0x4}, 0x38) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r8) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 23.672299129s ago: executing program 36 (id=29635): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) syz_clone(0x100, &(0x7f0000000380)="df8516a30b2c9de5c0590411c36d792917c506535403f9ba17c0ac0022857cfb5fa4f7656ec836aaddeb1f7af460a77edd321b7834cb93eb100143f25d1f43df21e09bd762612e8c54bd01d015b753f949d37df304de1c23488de23c4e73db6b0807cc67a209be415b44724ba9b2d89d7942e271efc7f7d4d881ba30b5f67b751b0939cad7c65fbcbedab16786b7625deb40289b", 0x94, &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)="a5e5255cf8f319155bc2382bf45c7f61fec5b1809e8211f1cbe9dc6d5b0f13a50feb9f9dffbb89c01173630f4cabb78ec81fa3e76edc6d6b6408e84e860436533ee3841137687e60f8252f1b4e2b29db7226d80cbc2ede650796785ff30232be733b1b542d04142f035d513327cc814507c696d6131c20905974bb01ea52205031344112a5177cd13e230cebe5ad7b6770e2d7405fe4ca759d25464d7eee5e719e09041c50ba5abd907171d332d81224607f002ab3fef01ec6ef2961") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="b9ff030f6044238cb89e14f088ca", 0x0, 0x2b, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = syz_clone(0x92260000, &(0x7f0000000580)="43082647101fb2b00533391868601c60f0985a2883f6c186ebe454954e562f7a5dbd2bdc5a21282befd78c772e89932f92a938fec514a3cd838d699659381523d6823fc07de552b1730922c2d6996f44dfd189da37fc8eebb28a10b411567fc533b8f022d2e26c2ca300b21b9321506fafbcd9cbd57839cf9506f3bb47b15ca9c7dcdb15f47e6cb557971e4cbe5904493942f804e9253ab94f7ad2cddcd3d8bb13c57913e6760da89ade04dee86e96c807b9565f999a3ac56422572492d837eaef6be5a81fab90223e71d2c75d6220bd79e2e4091f0c9b362533e775da5ae468ca42beb1aadd4d", 0xe7, &(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)="4b7ff56e06ad9fcf4bc12b1ddc99dd97453ee580e17b9f379b4860e52f118f") perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xc, 0x8, 0x81, 0xe9, 0x0, 0xfffffffffffff800, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b, 0x1, @perf_config_ext={0x10001, 0x1}, 0x1, 0x40, 0x7, 0x8, 0x62b8, 0xfffffffe, 0x5c66, 0x0, 0x5, 0x0, 0x6}, r5, 0x9, r2, 0x2) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000, 0x0, 0xffffff64}, 0x2c) 16.391837285s ago: executing program 37 (id=29645): perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8124a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x2000000, 0x0, 0x7, 0x10000000004, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='cpu<-0||!') r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x301142, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000640)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1bd4000c"], 0xffdd) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) 14.421156471s ago: executing program 38 (id=29647): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ip6erspan0\x00', 0x10}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x1818, 0x2, 0x0, 0x0, 0x0, 0x1b24, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), &(0x7f0000000340), 0x619, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2, r1}, 0xc) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000400)=""/136) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000600)=0xd, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xb, 0x32, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x380e834a, 0x0, 0x0, 0x0, 0xde2}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x9}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x4, 0x6, 0x1, 0xc1e7, 0x2}, @ldst={0x1, 0x1, 0x3, 0xb, 0xb, 0xffffffffffffffff, 0xfffffffffffffffc}, @ringbuf_query, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x34987c179153ee28, 0x2, 0x5, 0x6, 0xfffffffffffffffc}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='syzkaller\x00', 0x3, 0xc8, &(0x7f00000002c0)=""/200, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r0, 0x7, &(0x7f00000004c0)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x5, 0x4, 0x3, 0x9}, {0x4, 0x1, 0xb, 0x3}, {0x3, 0x4, 0x8, 0x5}, {0x5, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x0, 0xa}, {0x4, 0x4, 0x3, 0x5}, {0x1, 0x1, 0x10, 0x4}], 0x10, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0xfffffffc}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r6, 0xf, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) 0s ago: executing program 39 (id=29642): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={0x1, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r0, 0x80000000, 0x18}, 0xc) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a7, 0x1a7, 0x3, [@enum={0xd, 0x5, 0x0, 0x6, 0x4, [{0x6, 0x8}, {0xa, 0x1149}, {0x8, 0x7}, {0x1, 0x4}, {0xc, 0x1}]}, @enum={0x3, 0x5, 0x0, 0x6, 0x4, [{0x6, 0x8a}, {0x9, 0xfffffff7}, {0x2, 0x3}, {0x2, 0x7}, {0x10, 0x2}]}, @union={0xd, 0x6, 0x0, 0x5, 0x1, 0x1000, [{0x2, 0x4, 0x8}, {0x10, 0x1, 0x4}, {0x5, 0x3, 0x5}, {0x6, 0x1, 0x5}, {0x1, 0x8a5, 0x200}, {0x6, 0x2, 0xfffffff8}]}, @datasec={0xd, 0x2, 0x0, 0xf, 0x3, [{0x5, 0x80, 0x3}, {0x3, 0x5, 0x4}], "eca8bb"}, @enum={0x6, 0x8, 0x0, 0x6, 0x4, [{0x9, 0x4}, {0x10, 0x80000000}, {0x3, 0x4}, {0xe, 0xd7cd}, {0xc, 0x7}, {0x8, 0x6}, {0x6, 0x9}, {0xb, 0x3}]}, @restrict={0xc, 0x0, 0x0, 0xb, 0x4}, @const={0xf, 0x0, 0x0, 0xa, 0x1}, @func={0xe, 0x0, 0x0, 0xc, 0x2}, @struct={0xf, 0x6, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3, 0xfffffff8}, {0x4, 0x0, 0x5}, {0x9, 0x1, 0xa}, {0x9, 0x1, 0x7}, {0x5, 0x3, 0x5}, {0x0, 0x3, 0x8}]}]}, {0x0, [0x0]}}, &(0x7f0000000840)=""/149, 0x1c3, 0x95, 0x1, 0x10000}, 0x28) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x4, 0x1, 0xfad4, 0x40c80, r2, 0x2, '\x00', r1, 0xffffffffffffffff, 0x4, 0x4, 0x1}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=ANY=[@ANYBLOB="0b00000005000000070000000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000000000000000000000000ff00000000000000"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000b"], 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000000400000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000040)={r9, r7}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0xd}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @ldst={0x2, 0x3, 0x1, 0xa, 0x9, 0x10, 0xfffffffffffffff0}]}, &(0x7f0000000980)='syzkaller\x00', 0xeef, 0x1c, &(0x7f0000000a40)=""/28, 0x40f00, 0x22, '\x00', r1, 0x17, r3, 0x8, &(0x7f0000000a80)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x0, 0x40, 0xffffffff}, 0x10, 0x12e53, r6, 0x1, 0x0, &(0x7f0000000b00)=[{0x3, 0x4, 0xe, 0x7}], 0x10, 0x401}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002e00)={r10, 0x0, 0x38, 0x1000, &(0x7f0000000c00)="83462f5c513af320a7dd9483513379feb262bcc553ccaa44fdf3b6c5c27ca99738f2a5f29a5c3d9734020a772d26b713f71e2f942a1c2b2e", &(0x7f0000001c80)=""/4096, 0x7, 0x0, 0xfb, 0x64, &(0x7f0000002c80)="021eebaba956a85ba1cdacce545e37a39d881b98d25bc0dd156e8a270e51cb87b41f90c07eb5c258f65e76322c2ce1b4a4ea7d031028f55aa7e8f85ba81c6ad52823af605208f0ae43484612dc786682fd7f0cbe5e0ac3a753289a04d45088f8518a68bcd5fae66035d8efd842d9e82fdb705ab0d2671a910da3e55e7b66f5ecfd0171e0fd1f159ebccb888b995dac0b05ea87be662a0206a07061c074837f75f9cf675a598ed69bc87ffe7212b0731b15ecb2cc75c3449dc518a02a320f697d4c57e49f2949662cb12ee0458fb8f1a2dbf548fe1f1da0bd2abb45d6d02da5ecbf7ffc4a5848e79be7f13ceeeb8f2c25da372b88cda11e7c64d2e1", &(0x7f0000002d80)="880fed11329c75b09b2808565ccbfbc8c177771ebccd20cd03ab3212963b17b71ad8e703d5e47c8cb2275f43a49b941342b710e80733033900243f9e51b62bcd37029696002b0ad26fe9cdfc538d54b00e43befcb245470d0bd365d599e9ed65f0d3f288", 0x6, 0x0, 0x6}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xb2, 0x0, 0x0, 0x1, 0x0, 0xffffffffdffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8}, 0x0, 0x0, 0x1, 0x0, 0xfe2, 0x0, 0x20, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f1, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000100)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x59}}, {{0x5, 0x0, 0x5, 0x9, 0x0, 0x1, 0x40000000}}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x7b) kernel console output (not intermixed with test programs): 6] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 1543.078064][T11213] device syzkaller0 entered promiscuous mode [ 1543.140657][T11217] bridge0: port 1(bridge_slave_0) entered blocking state [ 1543.147830][T11217] bridge0: port 1(bridge_slave_0) entered disabled state [ 1543.155223][T11217] device bridge_slave_0 entered promiscuous mode [ 1543.162500][T11217] bridge0: port 2(bridge_slave_1) entered blocking state [ 1543.169551][T11217] bridge0: port 2(bridge_slave_1) entered disabled state [ 1543.177697][T11217] device bridge_slave_1 entered promiscuous mode [ 1543.266865][T11217] bridge0: port 2(bridge_slave_1) entered blocking state [ 1543.273981][T11217] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1543.281353][T11217] bridge0: port 1(bridge_slave_0) entered blocking state [ 1543.288565][T11217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1543.384435][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1543.393879][T29226] bridge0: port 1(bridge_slave_0) entered disabled state [ 1543.401377][T29226] bridge0: port 2(bridge_slave_1) entered disabled state [ 1543.418216][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1543.426695][T29226] bridge0: port 1(bridge_slave_0) entered blocking state [ 1543.433750][T29226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1543.441950][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1543.454217][T29226] bridge0: port 2(bridge_slave_1) entered blocking state [ 1543.461296][T29226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1543.525576][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1543.537418][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1543.597939][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1543.609299][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1543.647448][T11217] device veth0_vlan entered promiscuous mode [ 1543.657155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1543.665248][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1543.673903][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1543.683780][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1543.700892][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1543.717942][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1543.727851][T11217] device veth1_macvtap entered promiscuous mode [ 1543.740914][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1543.749392][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1543.758170][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1543.777312][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1543.787044][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1543.861703][T11252] syz.6.21764[11252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1545.705173][T11319] device wg2 left promiscuous mode [ 1545.905050][T11317] device wg2 entered promiscuous mode [ 1546.215624][T11359] device syzkaller0 entered promiscuous mode [ 1546.369239][T11373] bridge0: port 3(gretap0) entered blocking state [ 1546.375958][T11373] bridge0: port 3(gretap0) entered disabled state [ 1546.383154][T11373] device gretap0 entered promiscuous mode [ 1546.389464][T11373] bridge0: port 3(gretap0) entered blocking state [ 1546.395917][T11373] bridge0: port 3(gretap0) entered forwarding state [ 1549.608017][T11444] device syzkaller0 entered promiscuous mode [ 1553.771248][T11665] device syzkaller0 entered promiscuous mode [ 1553.890021][T11668] bridge0: port 3(gretap0) entered disabled state [ 1553.897040][T11668] bridge0: port 2(bridge_slave_1) entered disabled state [ 1553.907721][T11668] bridge0: port 1(bridge_slave_0) entered disabled state [ 1557.245916][T11792] device syzkaller0 entered promiscuous mode [ 1557.429194][T11799] device syzkaller0 entered promiscuous mode [ 1559.234908][T11897] device syzkaller0 entered promiscuous mode [ 1559.485991][T11916] ÿÿÿÿÿÿ: renamed from vlan1 [ 1560.038572][T11992] device syzkaller0 entered promiscuous mode [ 1560.915573][T12030] device syzkaller0 entered promiscuous mode [ 1561.110301][T12033] device syzkaller0 entered promiscuous mode [ 1561.503877][T12089] device syzkaller0 entered promiscuous mode [ 1561.589736][T12104] bridge0: port 2(bridge_slave_1) entered disabled state [ 1561.597359][T12104] bridge0: port 1(bridge_slave_0) entered disabled state [ 1561.606731][T12105] device bridge_slave_1 left promiscuous mode [ 1561.613071][T12105] bridge0: port 2(bridge_slave_1) entered disabled state [ 1561.620898][T12105] device bridge_slave_0 left promiscuous mode [ 1561.627420][T12105] bridge0: port 1(bridge_slave_0) entered disabled state [ 1563.343006][T12212] : port 1(ip6gretap0) entered blocking state [ 1563.361284][T12212] : port 1(ip6gretap0) entered disabled state [ 1563.408388][T12212] device ip6gretap0 entered promiscuous mode [ 1563.628139][T12214] device ip6gretap0 left promiscuous mode [ 1563.634137][T12214] : port 1(ip6gretap0) entered disabled state [ 1563.949615][T12224] device wg2 left promiscuous mode [ 1564.116539][T12219] device wg2 entered promiscuous mode [ 1564.861742][T12246] device syzkaller0 entered promiscuous mode [ 1564.884120][T12256] Ÿë: port 1(vlan1) entered blocking state [ 1564.930205][T12256] Ÿë: port 1(vlan1) entered disabled state [ 1564.966423][T12256] device vlan1 entered promiscuous mode [ 1565.689421][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1565.705109][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1565.715461][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1566.046092][T12279] device syzkaller0 entered promiscuous mode [ 1566.068168][T12275] device wg2 entered promiscuous mode [ 1566.493040][T12293] device syzkaller0 entered promiscuous mode [ 1566.945789][T12293] bridge0: port 3(gretap0) entered blocking state [ 1566.955370][T12293] bridge0: port 3(gretap0) entered disabled state [ 1566.963389][T12293] device gretap0 entered promiscuous mode [ 1566.999716][T12303] device wg2 entered promiscuous mode [ 1567.308584][T12371] device syzkaller0 entered promiscuous mode [ 1567.903375][T12402] device sit0 entered promiscuous mode [ 1569.836878][T12443] device syzkaller0 entered promiscuous mode [ 1570.621405][T12483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1570.630286][T12483] bridge0: port 1(bridge_slave_0) entered disabled state [ 1570.648522][T12483] device bridge_slave_0 entered promiscuous mode [ 1570.664704][T12483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1570.676302][T12483] bridge0: port 2(bridge_slave_1) entered disabled state [ 1570.687365][T12483] device bridge_slave_1 entered promiscuous mode [ 1570.794263][T12483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1570.801456][T12483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1570.808759][T12483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1570.815785][T12483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1570.859344][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1570.879220][ T1938] bridge0: port 1(bridge_slave_0) entered disabled state [ 1570.888118][ T1938] bridge0: port 2(bridge_slave_1) entered disabled state [ 1570.905644][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1570.923335][ T1938] bridge0: port 1(bridge_slave_0) entered blocking state [ 1570.930434][ T1938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1570.938740][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1570.947073][ T1938] bridge0: port 2(bridge_slave_1) entered blocking state [ 1570.954131][ T1938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1570.970613][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1570.980352][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1571.014121][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1571.029469][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1571.038633][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1571.048657][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1571.058509][T12483] device veth0_vlan entered promiscuous mode [ 1571.260260][T12483] device veth1_macvtap entered promiscuous mode [ 1571.269801][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1571.309807][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1571.329669][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1571.355644][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1571.371945][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1571.407328][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1571.416759][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1573.890914][T12608] device syzkaller0 entered promiscuous mode [ 1574.100461][T12617] device syzkaller0 entered promiscuous mode [ 1575.578276][T12664] batadv0: tun_chr_ioctl cmd 2148553947 [ 1575.890370][T12665] batadv0: tun_chr_ioctl cmd 1074812117 [ 1578.801216][T12875] bridge0: port 3(gretap0) entered blocking state [ 1578.807904][T12875] bridge0: port 3(gretap0) entered forwarding state [ 1578.814589][T12875] bridge0: port 2(bridge_slave_1) entered blocking state [ 1578.821758][T12875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1578.829075][T12875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1578.836179][T12875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1578.927257][T12875] device bridge0 entered promiscuous mode [ 1579.037369][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1579.143518][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1581.386128][T13061] device syzkaller0 entered promiscuous mode [ 1581.816381][T13084] gretap0: mtu less than device minimum [ 1582.329836][ T2169] device syz_tun left promiscuous mode [ 1582.347650][ T2169] : port 1(syz_tun) entered disabled state [ 1582.471683][T13121] device syzkaller0 entered promiscuous mode [ 1582.561764][T13111] bridge0: port 1(bridge_slave_0) entered blocking state [ 1582.615108][T13111] bridge0: port 1(bridge_slave_0) entered disabled state [ 1582.647766][T13111] device bridge_slave_0 entered promiscuous mode [ 1582.667948][T13111] bridge0: port 2(bridge_slave_1) entered blocking state [ 1582.675230][T13111] bridge0: port 2(bridge_slave_1) entered disabled state [ 1582.682997][T13111] device bridge_slave_1 entered promiscuous mode [ 1583.666644][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1583.674324][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1583.688256][T13159] device syzkaller0 entered promiscuous mode [ 1583.928528][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1583.937034][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1583.945531][T18274] bridge0: port 1(bridge_slave_0) entered blocking state [ 1583.952618][T18274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1583.960370][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1584.084070][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1584.092583][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1584.131145][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 1584.138218][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1584.379067][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1584.387712][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1584.395927][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1584.405329][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1584.416462][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1584.425119][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1584.480145][T13111] device veth0_vlan entered promiscuous mode [ 1584.487156][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1584.495605][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1584.941682][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1584.949748][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1585.211437][T13111] device veth1_macvtap entered promiscuous mode [ 1585.230688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1585.240513][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1585.249084][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1585.390189][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1585.398701][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1585.407368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1585.416584][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1585.426569][T13179] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1585.433290][T13179] syzkaller0: Linktype set failed because interface is up [ 1587.252498][ T1938] device veth1 left promiscuous mode [ 1587.270438][ T1938] bridge0: port 3(veth1) entered disabled state [ 1587.328016][ T1938] device bridge_slave_1 left promiscuous mode [ 1587.334182][ T1938] bridge0: port 2(bridge_slave_1) entered disabled state [ 1587.413952][ T1938] device bridge_slave_0 left promiscuous mode [ 1587.420415][ T1938] bridge0: port 1(bridge_slave_0) entered disabled state [ 1587.430605][ T1938] device veth0_vlan left promiscuous mode [ 1588.605673][T13349] device syzkaller0 left promiscuous mode [ 1589.207878][T13412] device veth1_macvtap left promiscuous mode [ 1589.510941][T13412] device veth1_macvtap entered promiscuous mode [ 1589.568158][T13412] device macsec0 entered promiscuous mode [ 1589.864898][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.871198][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.876596][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.892618][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.899342][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.912964][T13450] tap0: tun_chr_ioctl cmd 1074025692 [ 1589.920369][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.925781][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.937597][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.943016][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.955887][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.969271][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.974687][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1589.985410][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.004769][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.010428][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.016344][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.048292][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.053727][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.076448][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.083241][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.104499][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.110318][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.122857][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.133206][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.145098][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.155844][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.161527][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.166895][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.173680][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.179632][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.185253][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.201768][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.287566][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.293035][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.312105][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.337285][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.368621][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.428809][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.434253][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.441534][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.463517][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.470381][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.475754][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.507581][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.528168][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.533580][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.577066][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.592858][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.598432][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.603807][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.613938][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.624056][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1590.672335][T13452] tap0: tun_chr_ioctl cmd 1074025673 [ 1592.100676][T13571] device sit0 left promiscuous mode [ 1592.389025][T13572] device sit0 entered promiscuous mode [ 1592.680052][T13581] device syzkaller0 left promiscuous mode [ 1595.178862][T13762] €Â0: renamed from pim6reg1 [ 1595.308387][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1595.678478][ C1] syzkaller0: tun_net_xmit 76 [ 1596.408531][ C0] syzkaller0: tun_net_xmit 76 [ 1596.544360][T13843] bridge0: port 1(bridge_slave_0) entered blocking state [ 1596.552881][T13843] bridge0: port 1(bridge_slave_0) entered disabled state [ 1596.560839][T13843] device bridge_slave_0 entered promiscuous mode [ 1596.571004][T13843] bridge0: port 2(bridge_slave_1) entered blocking state [ 1596.588145][T13843] bridge0: port 2(bridge_slave_1) entered disabled state [ 1596.596568][T13843] device bridge_slave_1 entered promiscuous mode [ 1596.682773][T13843] bridge0: port 2(bridge_slave_1) entered blocking state [ 1596.689964][T13843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1596.697266][T13843] bridge0: port 1(bridge_slave_0) entered blocking state [ 1596.704372][T13843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1596.739749][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1596.755099][T10248] bridge0: port 1(bridge_slave_0) entered disabled state [ 1596.780670][T10248] bridge0: port 2(bridge_slave_1) entered disabled state [ 1596.819026][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1596.831621][T10248] bridge0: port 1(bridge_slave_0) entered blocking state [ 1596.838796][T10248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1596.865657][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1596.875739][T10248] bridge0: port 2(bridge_slave_1) entered blocking state [ 1596.882816][T10248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1596.912041][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1596.922379][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1596.934727][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1596.942899][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1596.957490][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1596.965874][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1596.976012][T13843] device veth0_vlan entered promiscuous mode [ 1596.994521][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1597.004616][T13843] device veth1_macvtap entered promiscuous mode [ 1597.022606][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1597.046181][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1597.736067][ T1938] bridge0: port 3(gretap0) entered disabled state [ 1597.770563][ T1938] device gretap0 left promiscuous mode [ 1597.817815][ T1938] bridge0: port 3(gretap0) entered disabled state [ 1598.020075][ T1938] device bridge_slave_1 left promiscuous mode [ 1598.029870][ T1938] bridge0: port 2(bridge_slave_1) entered disabled state [ 1598.045589][ T1938] device bridge_slave_0 left promiscuous mode [ 1598.054017][ T1938] bridge0: port 1(bridge_slave_0) entered disabled state [ 1600.799173][T14040] device syzkaller0 entered promiscuous mode [ 1601.027320][T14073] device syzkaller0 entered promiscuous mode [ 1601.036977][T14073] device syzkaller0 left promiscuous mode [ 1601.065144][T14070] device veth0_vlan left promiscuous mode [ 1601.074654][T14070] device veth0_vlan entered promiscuous mode [ 1601.276902][T14098] bridge0: port 4(veth1) entered blocking state [ 1601.283667][T14098] bridge0: port 4(veth1) entered disabled state [ 1601.291694][T14098] device veth1 entered promiscuous mode [ 1601.297723][T14098] bridge0: port 4(veth1) entered blocking state [ 1601.304010][T14098] bridge0: port 4(veth1) entered listening state [ 1601.372766][T14107] device syzkaller0 entered promiscuous mode [ 1601.873556][T14144] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1601.909904][ C1] syzkaller0: tun_net_xmit 76 [ 1602.185676][T14144] syzkaller0: Linktype set failed because interface is up [ 1602.358325][T14152] bridge0: port 2(bridge_slave_1) entered disabled state [ 1602.365690][T14152] bridge0: port 1(bridge_slave_0) entered disabled state [ 1602.523270][T14151] device bridge_slave_1 left promiscuous mode [ 1602.536266][T14151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1602.592307][T14151] device bridge_slave_0 left promiscuous mode [ 1602.605080][T14151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1603.170021][T14217] device sit0 entered promiscuous mode [ 1603.963596][T14242] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 1604.448568][T14285] device syzkaller0 entered promiscuous mode [ 1606.245763][T14327] device sit0 entered promiscuous mode [ 1606.801573][T14355] device syzkaller0 entered promiscuous mode [ 1606.814213][T14357] bridge0: port 2(bridge_slave_1) entered disabled state [ 1606.821453][T14357] bridge0: port 1(bridge_slave_0) entered disabled state [ 1606.834282][T14353] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 1606.840797][T14353] syzkaller0: tun_net_xmit 1280 [ 1606.846040][T14357] bridge0: port 2(bridge_slave_1) entered blocking state [ 1606.853120][T14357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1606.860417][T14357] bridge0: port 1(bridge_slave_0) entered blocking state [ 1606.867471][T14357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1606.875026][ C0] syzkaller0: tun_net_xmit 76 [ 1606.880280][T14357] device bridge0 entered promiscuous mode [ 1608.038717][T14434] geneve1: tun_chr_ioctl cmd 1074025672 [ 1608.044410][T14434] geneve1: ignored: set checksum enabled [ 1608.587669][T14479] device syzkaller0 entered promiscuous mode [ 1608.921775][T14486] device syzkaller0 entered promiscuous mode [ 1610.320841][T14556] device syzkaller0 left promiscuous mode [ 1610.839225][T14566] device syzkaller0 entered promiscuous mode [ 1613.175670][T14627] batadv0: tun_chr_ioctl cmd 1074025677 [ 1613.186266][T14627] batadv0: linktype set to 804 [ 1614.353013][T14676] »»»»»»: renamed from syzkaller0 [ 1615.197272][T14681] ÿÿÿÿÿÿ: renamed from vlan1 [ 1616.174617][T14712] syzkaller0: tun_chr_ioctl cmd 1074812118 [ 1616.198003][ C1] syzkaller0: tun_net_xmit 76 [ 1616.261678][T14712] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 1616.272672][T14712] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 1616.285109][T14712] syzkaller0: tun_net_xmit 1280 [ 1616.290180][ C1] syzkaller0: tun_net_xmit 76 [ 1616.425483][T14715] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1616.485855][T14715] device syzkaller0 entered promiscuous mode [ 1616.514885][T14720] device syzkaller0 entered promiscuous mode [ 1616.701027][ C0] bridge0: port 4(veth1) entered learning state [ 1617.132559][T14793] device syzkaller0 entered promiscuous mode [ 1618.066185][T14891] bridge0: port 5(veth0_to_bridge) entered blocking state [ 1618.073573][T14891] bridge0: port 5(veth0_to_bridge) entered disabled state [ 1618.104712][T14891] device veth0_to_bridge entered promiscuous mode [ 1618.125053][T14891] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1618.197575][T14891] bridge0: port 5(veth0_to_bridge) entered blocking state [ 1618.205318][T14891] bridge0: port 5(veth0_to_bridge) entered listening state [ 1618.363765][T14921] device syzkaller0 entered promiscuous mode [ 1618.531380][T14943] syzkaller0: tun_net_xmit 1280 [ 1618.532825][T14942] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 1618.557211][ C1] syzkaller0: tun_net_xmit 76 [ 1618.581037][T14949] device syzkaller0 entered promiscuous mode [ 1618.626160][T14949] syzkaller0: tun_net_xmit 1280 [ 1618.680332][T14949] syzkaller0: create flow: hash 1890057433 index 1 [ 1618.781528][T14946] syzkaller0: delete flow: hash 1890057433 index 1 [ 1619.802504][T15051] device syzkaller0 entered promiscuous mode [ 1619.929087][T15064] device syzkaller0 entered promiscuous mode [ 1619.977520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1619.989704][ C0] bridge0: port 5(veth0_to_bridge) entered blocking state [ 1620.542564][T15071] device syzkaller0 left promiscuous mode [ 1620.576884][T15074] device syzkaller0 entered promiscuous mode [ 1621.963347][T15135] device syzkaller0 entered promiscuous mode [ 1622.783423][T15190] device sit0 left promiscuous mode [ 1622.843268][T15190] device sit0 entered promiscuous mode [ 1623.418830][T15219] ±ÿ: renamed from team_slave_1 [ 1624.041967][T15282] device sit0 left promiscuous mode [ 1624.092483][T15294] device syzkaller0 entered promiscuous mode [ 1624.116460][T15270] device sit0 entered promiscuous mode [ 1624.542664][T15309] device syzkaller0 entered promiscuous mode [ 1624.597213][ C1] syzkaller0: tun_net_xmit 76 [ 1624.718327][ C1] syzkaller0: tun_net_xmit 76 [ 1625.159742][T15351] device sit0 entered promiscuous mode [ 1625.519040][T15396] device syzkaller0 entered promiscuous mode [ 1625.819627][T15433] syz.5.23001[15433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1625.819685][T15433] syz.5.23001[15433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1626.468854][T15485] device syzkaller0 entered promiscuous mode [ 1626.566505][T15487] syz.5.23018[15487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1626.573599][T15487] syz.5.23018[15487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1627.082189][T15549] device syzkaller0 entered promiscuous mode [ 1627.370299][T15573] syz.2.23040[15573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1627.370360][T15573] syz.2.23040[15573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1627.823904][T15611] device syzkaller0 left promiscuous mode [ 1632.057261][ C0] bridge0: port 4(veth1) entered forwarding state [ 1632.063910][ C0] bridge0: topology change detected, propagating [ 1632.092243][T15817] device syzkaller0 entered promiscuous mode [ 1632.142804][T15817] syzkaller0: tun_chr_ioctl cmd 2147767521 [ 1632.362042][T15837] device syzkaller0 entered promiscuous mode [ 1633.166447][T15926] device veth1_macvtap left promiscuous mode [ 1633.187052][T15926] device macsec0 entered promiscuous mode [ 1633.612246][T15979] device vlan0 entered promiscuous mode [ 1633.664975][T15979] device syzkaller0 entered promiscuous mode [ 1633.672545][T15985] €Â0: renamed from pim6reg1 [ 1634.424293][T16082] device syzkaller0 left promiscuous mode [ 1635.685737][T16136] syzkaller0: create flow: hash 172491418 index 1 [ 1635.929392][T16137] syzkaller0: delete flow: hash 172491418 index 1 [ 1636.194896][T16181] device wg2 left promiscuous mode [ 1636.417221][T16181] device wg2 entered promiscuous mode [ 1639.796130][T16253] device syzkaller0 entered promiscuous mode [ 1641.829376][T16318] device syzkaller0 entered promiscuous mode [ 1641.980514][T16327] device sit0 left promiscuous mode [ 1642.020841][T16327] device sit0 entered promiscuous mode [ 1642.484499][T16335] bridge0: port 1(bridge_slave_0) entered blocking state [ 1642.492345][T16335] bridge0: port 1(bridge_slave_0) entered disabled state [ 1642.499986][T16335] device bridge_slave_0 entered promiscuous mode [ 1642.517130][T16341] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 1642.517699][T16343] syzkaller0: create flow: hash 1890057433 index 2 [ 1642.717258][T16335] bridge0: port 2(bridge_slave_1) entered blocking state [ 1642.724679][T16335] bridge0: port 2(bridge_slave_1) entered disabled state [ 1642.732271][T16335] device bridge_slave_1 entered promiscuous mode [ 1642.787220][T16340] syzkaller0: delete flow: hash 1890057433 index 2 [ 1642.887800][T16335] bridge0: port 2(bridge_slave_1) entered blocking state [ 1642.894893][T16335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1642.902291][T16335] bridge0: port 1(bridge_slave_0) entered blocking state [ 1642.909329][T16335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1642.956498][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1642.968839][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1642.977613][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1643.012572][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1643.021384][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1643.030022][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1643.037171][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1643.205055][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1643.214659][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1643.222922][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 1643.229999][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1643.393956][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1643.403004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1643.419301][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1643.427759][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1643.456822][T16335] device veth0_vlan entered promiscuous mode [ 1643.473071][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1643.481499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1643.490137][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1643.498890][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1643.512117][T16335] device veth1_macvtap entered promiscuous mode [ 1643.525910][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1643.533823][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1643.541611][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1643.550632][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1643.559324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1643.568595][T16399] device syzkaller0 left promiscuous mode [ 1643.587552][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1643.596361][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1643.609459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1643.618744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1643.878437][ T1938] bridge0: port 3(gretap0) entered disabled state [ 1643.898354][ T1938] device gretap0 left promiscuous mode [ 1643.903851][ T1938] bridge0: port 3(gretap0) entered disabled state [ 1644.234805][T16441] device syzkaller0 entered promiscuous mode [ 1644.425428][ T1938] device vlan1 left promiscuous mode [ 1644.430975][ T1938] Ÿë: port 1(vlan1) entered disabled state [ 1644.438314][ T1938] device veth0_to_bridge left promiscuous mode [ 1644.444633][ T1938] bridge0: port 5(veth0_to_bridge) entered disabled state [ 1644.452347][ T1938] device veth1 left promiscuous mode [ 1644.458858][ T1938] bridge0: port 4(veth1) entered disabled state [ 1644.466406][ T1938] device bridge_slave_1 left promiscuous mode [ 1644.478256][ T1938] bridge0: port 2(bridge_slave_1) entered disabled state [ 1644.492395][ T1938] device bridge_slave_0 left promiscuous mode [ 1644.498949][ T1938] bridge0: port 1(bridge_slave_0) entered disabled state [ 1644.779470][T16485] tap0: tun_chr_ioctl cmd 1074025673 [ 1644.797850][T16483] tap0: tun_chr_ioctl cmd 1074025675 [ 1644.809999][T16483] tap0: persist enabled [ 1644.814611][T16485] tap0: tun_chr_ioctl cmd 1074025675 [ 1644.820199][T16485] tap0: persist enabled [ 1644.837382][T16483] tap0: tun_chr_ioctl cmd 1074025675 [ 1644.857005][T16483] tap0: persist enabled [ 1646.006448][T16551] : renamed from bond_slave_0 [ 1646.160068][T16557] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 1646.311243][T16568] device macsec0 entered promiscuous mode [ 1648.107068][T16676] +: renamed from team_slave_1 [ 1653.314583][T16848] device syzkaller0 entered promiscuous mode [ 1653.373993][T16848] device syzkaller0 left promiscuous mode [ 1654.147946][T16899] device syzkaller0 left promiscuous mode [ 1654.615236][T16919] device wg2 entered promiscuous mode [ 1655.527030][T16956] device syzkaller0 entered promiscuous mode [ 1655.738423][T16972] device syzkaller0 entered promiscuous mode [ 1657.005836][T17050] device syzkaller0 entered promiscuous mode [ 1657.106987][T17064] syz.2.23452[17064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1657.107033][T17064] syz.2.23452[17064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1658.774312][T17131] device sit0 left promiscuous mode [ 1659.081616][T17148] device syzkaller0 left promiscuous mode [ 1659.406288][T17166] device syzkaller0 entered promiscuous mode [ 1659.544011][T17176] device syzkaller0 entered promiscuous mode [ 1659.705908][T17186] device syzkaller0 entered promiscuous mode [ 1659.712730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1659.899051][T17201] ip6tnl0: mtu less than device minimum [ 1662.025941][T17250] device syzkaller0 entered promiscuous mode [ 1666.243774][T17414] device syzkaller0 entered promiscuous mode [ 1666.266295][T17418] : port 1(ip6gretap0) entered blocking state [ 1666.277813][T17418] : port 1(ip6gretap0) entered disabled state [ 1666.294893][T17418] device ip6gretap0 entered promiscuous mode [ 1666.316657][T17418] device ip6gretap0 left promiscuous mode [ 1666.337826][T17418] : port 1(ip6gretap0) entered disabled state [ 1666.846304][T17439] device syzkaller0 entered promiscuous mode [ 1668.487521][T17507] device syzkaller0 entered promiscuous mode [ 1669.513165][T17519] bridge0: port 2(bridge_slave_1) entered disabled state [ 1669.525665][T17519] bridge0: port 1(bridge_slave_0) entered disabled state [ 1669.747184][T17523] device bridge_slave_1 left promiscuous mode [ 1669.753378][T17523] bridge0: port 2(bridge_slave_1) entered disabled state [ 1669.777729][T17523] device bridge_slave_0 left promiscuous mode [ 1669.797307][T17523] bridge0: port 1(bridge_slave_0) entered disabled state [ 1670.991095][T17611] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1671.011771][T17611] device syzkaller0 entered promiscuous mode [ 1671.319525][T17638] device macsec0 entered promiscuous mode [ 1671.326573][T17638] device veth1_macvtap left promiscuous mode [ 1672.444751][T17710] device syzkaller0 left promiscuous mode [ 1672.484616][T17712] device syzkaller0 entered promiscuous mode [ 1674.660305][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1675.068338][T17801] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1675.825647][T17836] geneve0: tun_chr_ioctl cmd 1074025677 [ 1675.841953][T17836] geneve0: linktype set to 1 [ 1676.020959][T17868] device syzkaller0 left promiscuous mode [ 1679.975162][T18003] sit0: mtu greater than device maximum [ 1680.025195][T18003] device sit0 entered promiscuous mode [ 1681.353693][T18035] syz.3.23732[18035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1681.353787][T18035] syz.3.23732[18035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1681.683323][T18051] device syzkaller0 entered promiscuous mode [ 1682.389400][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1682.406508][T18074] device wg2 entered promiscuous mode [ 1682.436684][T18088] device syzkaller0 entered promiscuous mode [ 1682.456922][T18088] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1682.477989][T18086] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1682.500811][T18089] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1682.516737][T18085] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1682.539795][T18085] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1682.572114][T18085] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1683.271229][T18136] device syzkaller0 entered promiscuous mode [ 1684.967280][ C0] syzkaller0: tun_net_xmit 76 [ 1685.172151][T18188] @ÿ: renamed from bond_slave_0 [ 1685.177452][ C0] syzkaller0: tun_net_xmit 76 [ 1688.856318][T18351] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 1691.673237][T18501] device syzkaller0 entered promiscuous mode [ 1692.189371][T18520] Ÿë: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1692.195537][T18520] Ÿë: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1692.202606][T18520] device ÿÿÿÿÿÿ entered promiscuous mode [ 1692.240596][T18520] device sit0 entered promiscuous mode [ 1692.365654][T18532] device syzkaller0 entered promiscuous mode [ 1692.393550][T18537] : renamed from bond_slave_0 [ 1692.867171][T18544] batadv0: tun_chr_ioctl cmd 1074025677 [ 1692.873441][T18544] batadv0: linktype set to 804 [ 1693.545356][T18645] tap0: tun_chr_ioctl cmd 1074025675 [ 1693.551925][T18645] tap0: persist enabled [ 1693.556374][T18645] tap0: tun_chr_ioctl cmd 1074025675 [ 1693.562196][T18645] tap0: persist disabled [ 1693.746101][T18660] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 1693.767248][ C0] syzkaller0: tun_net_xmit 76 [ 1693.998198][T18669] @0Ù: renamed from bond_slave_1 [ 1694.139466][ C0] syzkaller0: tun_net_xmit 48 [ 1694.279043][ C0] syzkaller0: tun_net_xmit 76 [ 1694.610629][T18713] device wg2 left promiscuous mode [ 1694.655342][T18709] device wg2 entered promiscuous mode [ 1695.625208][T18755] device pim6reg1 entered promiscuous mode [ 1696.886070][T18850] device syzkaller0 left promiscuous mode [ 1700.313286][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1700.322017][T19021] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1700.331856][T19021] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1700.380546][T19020] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1700.400584][T19020] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1700.617297][T19051] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1700.857337][T19057] device syzkaller0 entered promiscuous mode [ 1700.863718][T19057] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1700.878717][T19060] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1700.896995][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1700.917467][T19050] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1700.927556][T19050] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1701.078641][T19066] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1701.266311][T19094] device syzkaller0 entered promiscuous mode [ 1701.788767][T19065] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1702.710864][T19165] syzkaller0: tun_net_xmit 1280 [ 1702.727247][ C0] syzkaller0: tun_net_xmit 76 [ 1702.731697][T19165] syzkaller0: create flow: hash 3236331622 index 1 [ 1702.800308][T19164] syzkaller0: delete flow: hash 3236331622 index 1 [ 1703.795004][T19226] device sit0 left promiscuous mode [ 1703.862275][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1703.934130][T19231] device syzkaller0 left promiscuous mode [ 1703.942533][T19231] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1704.025090][T19226] device sit0 entered promiscuous mode [ 1704.678773][T19225] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1705.240109][T19262] device syzkaller0 entered promiscuous mode [ 1705.312465][T19294] device syzkaller0 left promiscuous mode [ 1705.326157][T19294] syzkaller0: create flow: hash 3849858750 index 1 [ 1705.751743][T19307] syzkaller0: delete flow: hash 3849858750 index 1 [ 1707.945463][T19478] device wg2 left promiscuous mode [ 1707.963752][T19467] device wg2 entered promiscuous mode [ 1713.312883][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1713.515832][T19688] 7B’ç÷ï: renamed from syzkaller0 [ 1713.825372][T19728] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1713.831234][T19728] syzkaller0: Linktype set failed because interface is up [ 1713.855747][T19726] device syzkaller0 entered promiscuous mode [ 1714.026376][T19729] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1714.063699][T19677] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1714.587477][T19794] ªªªªªª™™: renamed from vlan0 [ 1716.352522][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1716.468006][T19885] syzkaller0: tun_chr_ioctl cmd 1074025698 [ 1716.474118][T19885] device syzkaller0 entered promiscuous mode [ 1716.517363][T19885] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1717.109692][T19910] device syzkaller0 left promiscuous mode [ 1717.681996][T19933] : port 1(ip6gretap0) entered blocking state [ 1717.688973][T19933] : port 1(ip6gretap0) entered disabled state [ 1717.696619][T19933] device ip6gretap0 entered promiscuous mode [ 1717.718432][T19931] device wg2 entered promiscuous mode [ 1717.790306][T19933] device ip6gretap0 left promiscuous mode [ 1717.802443][T19933] : port 1(ip6gretap0) entered disabled state [ 1718.942292][T20010] device syzkaller0 entered promiscuous mode [ 1719.413711][T20023] device syzkaller0 entered promiscuous mode [ 1720.045075][T20051] device syzkaller0 left promiscuous mode [ 1720.113471][T20059] device syzkaller0 entered promiscuous mode [ 1720.237606][T20081] device syzkaller0 left promiscuous mode [ 1720.350651][T20099] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 1720.359070][T20099] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 1721.013177][T20141] device syzkaller0 entered promiscuous mode [ 1721.324969][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1721.401964][T20169] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1724.368869][T20323] device wg2 left promiscuous mode [ 1724.507663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1724.525696][T20337] device syzkaller0 entered promiscuous mode [ 1724.547409][T20337] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1724.593404][T20343] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1724.974195][T20337] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1724.993206][T20336] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1725.012333][T20336] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1725.024078][T20336] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1725.990282][T20438] syz.5.24437[20438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1725.990329][T20438] syz.5.24437[20438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1726.077997][T20452] device veth1_macvtap entered promiscuous mode [ 1726.139205][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1726.182680][T20452] device veth1_macvtap left promiscuous mode [ 1727.239536][T20584] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1727.245382][T20584] syzkaller0: Linktype set failed because interface is up [ 1727.418796][T20592] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 1728.934603][T20679] bridge0: port 1(bridge_slave_0) entered blocking state [ 1728.987173][T20679] bridge0: port 1(bridge_slave_0) entered disabled state [ 1729.018093][T20679] device bridge_slave_0 entered promiscuous mode [ 1729.055567][T20679] bridge0: port 2(bridge_slave_1) entered blocking state [ 1729.072217][T20679] bridge0: port 2(bridge_slave_1) entered disabled state [ 1729.085216][T20679] device bridge_slave_1 entered promiscuous mode [ 1729.184266][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1729.197344][T20707] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1729.215330][T20707] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1729.251035][T20706] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1729.264581][T20706] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1729.277896][T20714] device syzkaller0 entered promiscuous mode [ 1729.307886][T20706] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1729.327901][ C0] syzkaller0: tun_net_xmit 76 [ 1729.357243][ C1] syzkaller0: tun_net_xmit 76 [ 1729.364970][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1729.387910][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1729.409177][ T7468] bridge0: port 1(bridge_slave_0) entered blocking state [ 1729.416220][ T7468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1729.607484][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1729.643839][ T7468] bridge0: port 2(bridge_slave_1) entered blocking state [ 1729.650930][ T7468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1729.660678][T26895] syzkaller0: tun_net_xmit 76 [ 1729.665573][T26895] syzkaller0: tun_net_xmit 48 [ 1729.679748][T20718] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 1729.690078][ C1] syzkaller0: tun_net_xmit 76 [ 1729.815096][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1729.848293][ C1] syzkaller0: tun_net_xmit 76 [ 1729.856122][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1729.864577][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1730.027604][ C0] syzkaller0: tun_net_xmit 76 [ 1730.074769][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1730.084443][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1730.097476][ C0] syzkaller0: tun_net_xmit 76 [ 1730.134985][T20679] device veth0_vlan entered promiscuous mode [ 1730.199803][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1730.208146][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1730.228476][T20679] device veth1_macvtap entered promiscuous mode [ 1730.257642][ C1] syzkaller0: tun_net_xmit 76 [ 1730.316641][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1730.318688][ C1] syzkaller0: tun_net_xmit 76 [ 1730.324522][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1730.336740][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1730.351817][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1730.361613][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1730.372347][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1730.381088][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1730.417290][ C0] syzkaller0: tun_net_xmit 76 [ 1730.489145][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1730.508523][ C0] syzkaller0: tun_net_xmit 76 [ 1730.514005][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1730.523018][T20731] syzkaller0: tun_chr_ioctl cmd 2147767521 [ 1730.739203][ C1] syzkaller0: tun_net_xmit 76 [ 1731.060404][T20765] device syzkaller0 entered promiscuous mode [ 1731.179936][T20790] device veth1_macvtap entered promiscuous mode [ 1731.608182][T10248] device veth1_macvtap left promiscuous mode [ 1731.614210][T10248] device veth0_vlan left promiscuous mode [ 1732.494092][T20841] device syzkaller0 left promiscuous mode [ 1733.120097][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1733.761536][T20890] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1733.840790][T20913] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1733.904251][T20913] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1733.979754][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1733.999956][T20913] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1734.153290][T20912] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1734.182818][T20912] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1734.209755][T20912] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1737.540802][T21012] device wg2 left promiscuous mode [ 1737.765586][T21023] device wg2 entered promiscuous mode [ 1737.850613][T21034] IPv6: pim6reg1: Disabled Multicast RS [ 1739.793205][T21098] device syzkaller0 entered promiscuous mode [ 1739.837705][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1739.924686][T21108] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1740.481220][T21142] device pim6reg1 entered promiscuous mode [ 1742.196950][T21229] device syzkaller0 entered promiscuous mode [ 1742.542174][T21242] device wg2 entered promiscuous mode [ 1742.552141][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1742.560448][T21243] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1742.907266][T21243] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1744.895619][T21281] device wg2 left promiscuous mode [ 1744.906882][T21281] device wg2 entered promiscuous mode [ 1749.419072][T21395] syz.3.24710[21395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1749.419130][T21395] syz.3.24710[21395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1749.456575][T21395] device syzkaller0 entered promiscuous mode [ 1749.489166][T21402] syz.2.24712[21402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1749.489224][T21402] syz.2.24712[21402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1749.502815][T21402] syz.2.24712[21402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1749.515187][T21402] syz.2.24712[21402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1751.214573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1751.246990][T21464] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1751.291623][T21476] device syzkaller0 entered promiscuous mode [ 1751.303449][T21464] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1751.391211][T21463] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1751.554462][T21485] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1751.637886][T21490] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1751.670680][T21485] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1751.722662][T21484] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1751.741770][T21484] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1751.758460][T21484] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1755.238199][T21625] device syzkaller0 entered promiscuous mode [ 1755.351754][T21635] device syzkaller0 entered promiscuous mode [ 1755.649146][ C0] syzkaller0: tun_net_xmit 76 [ 1755.672313][T21645] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 1755.700762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1755.725469][T21647] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1755.733265][ C1] syzkaller0: tun_net_xmit 76 [ 1755.797216][ C1] syzkaller0: tun_net_xmit 76 [ 1756.263131][T21698] device syzkaller0 entered promiscuous mode [ 1757.323071][T21766] device syzkaller0 entered promiscuous mode [ 1758.573216][T21984] bridge0: port 1(bridge_slave_0) entered blocking state [ 1758.596353][T21984] bridge0: port 1(bridge_slave_0) entered disabled state [ 1758.614865][T21984] device bridge_slave_0 entered promiscuous mode [ 1758.628083][T21984] bridge0: port 2(bridge_slave_1) entered blocking state [ 1758.645492][T21984] bridge0: port 2(bridge_slave_1) entered disabled state [ 1758.653547][T21984] device bridge_slave_1 entered promiscuous mode [ 1758.756988][T21984] bridge0: port 2(bridge_slave_1) entered blocking state [ 1758.764584][T21984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1758.772049][T21984] bridge0: port 1(bridge_slave_0) entered blocking state [ 1758.779285][T21984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1758.830978][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1758.850241][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1758.927849][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1758.952886][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1758.967461][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1758.986208][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1758.994581][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1759.002001][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1759.010803][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1759.019845][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1759.028898][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 1759.036058][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1759.047548][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1759.055905][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1759.064059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1759.073461][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1759.099369][T21984] device veth0_vlan entered promiscuous mode [ 1759.108862][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1759.120756][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1759.133839][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1759.144330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1759.159855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1759.168926][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1759.195563][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1759.207757][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1759.233308][T21984] device veth1_macvtap entered promiscuous mode [ 1759.254811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1759.263836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1759.272491][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1759.281661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1759.291115][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1759.366254][T22030] device syzkaller0 entered promiscuous mode [ 1759.439906][T22042] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 1759.447739][T22042] syzkaller0: tun_net_xmit 1280 [ 1759.453023][T22042] syzkaller0: create flow: hash 1890057433 index 1 [ 1759.473376][T22041] syzkaller0: delete flow: hash 1890057433 index 1 [ 1759.548118][ C1] syzkaller0: tun_net_xmit 76 [ 1759.583892][T22062] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1759.620528][T22062] device syzkaller0 entered promiscuous mode [ 1763.351699][T22204] device wg2 entered promiscuous mode [ 1764.627859][T22276] device syzkaller0 entered promiscuous mode [ 1764.693757][T22281] device syzkaller0 left promiscuous mode [ 1765.342292][T22298] device syzkaller0 entered promiscuous mode [ 1766.926379][T22377] device wg2 left promiscuous mode [ 1767.055683][T22378] device wg2 entered promiscuous mode [ 1768.273152][T22480] device syzkaller0 entered promiscuous mode [ 1768.349148][T22483] device syzkaller0 entered promiscuous mode [ 1768.983565][T22525] device syzkaller0 entered promiscuous mode [ 1769.351701][T22546] @ÿ: renamed from bond_slave_0 [ 1769.571704][T22554] device syzkaller0 entered promiscuous mode [ 1771.561297][T22695] device syzkaller0 entered promiscuous mode [ 1773.583911][T22764] device syzkaller0 entered promiscuous mode [ 1773.682972][T22770] device syzkaller0 entered promiscuous mode [ 1774.057281][T22782] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 1775.662410][T22867] device lo entered promiscuous mode [ 1776.759124][T22937] device syzkaller0 entered promiscuous mode [ 1777.007229][T22951] device sit0 left promiscuous mode [ 1777.665868][T22957] device sit0 entered promiscuous mode [ 1778.598734][T22960] device xfrm0 entered promiscuous mode [ 1778.652192][T22988] device syzkaller0 entered promiscuous mode [ 1779.940318][T23065] device syzkaller0 entered promiscuous mode [ 1779.988914][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1780.005877][ T7806] syzkaller0: tun_net_xmit 48 [ 1781.154852][T23134] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 1781.204187][T23134] syzkaller0: tun_net_xmit 1280 [ 1781.243319][T23140] device syzkaller0 entered promiscuous mode [ 1781.371437][T23152] device wg2 left promiscuous mode [ 1781.467584][T23190] device sit0 left promiscuous mode [ 1781.597364][T23211] device sit0 entered promiscuous mode [ 1782.276076][T23240] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1782.704753][T23283] device syzkaller0 entered promiscuous mode [ 1782.761980][T23274] device syzkaller0 left promiscuous mode [ 1783.183911][T23316] syz.6.25226[23316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1783.183964][T23316] syz.6.25226[23316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1783.406463][T23321] device syzkaller0 entered promiscuous mode [ 1784.174736][T23372] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1784.181049][T23372] syzkaller0: Linktype set failed because interface is up [ 1785.536302][T23440] device syzkaller0 entered promiscuous mode [ 1785.692442][T23461] device veth0_vlan left promiscuous mode [ 1785.978071][T23461] device veth0_vlan entered promiscuous mode [ 1787.849637][T23580] bridge0: port 1(bridge_slave_0) entered blocking state [ 1787.856771][T23580] bridge0: port 1(bridge_slave_0) entered disabled state [ 1787.919817][T23580] device bridge_slave_0 entered promiscuous mode [ 1787.978308][T23580] bridge0: port 2(bridge_slave_1) entered blocking state [ 1787.985335][T23580] bridge0: port 2(bridge_slave_1) entered disabled state [ 1788.022696][T23580] device bridge_slave_1 entered promiscuous mode [ 1788.264409][T23580] bridge0: port 2(bridge_slave_1) entered blocking state [ 1788.271493][T23580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1788.278789][T23580] bridge0: port 1(bridge_slave_0) entered blocking state [ 1788.285810][T23580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1788.339037][T18274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1788.347085][T18274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1788.535003][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1788.568046][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1788.603333][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1788.620338][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1788.647643][T18274] bridge0: port 1(bridge_slave_0) entered blocking state [ 1788.654839][T18274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1788.666780][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1788.690490][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1788.701575][T18274] bridge0: port 2(bridge_slave_1) entered blocking state [ 1788.708663][T18274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1788.724302][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1788.739471][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1788.751497][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1788.763038][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1788.773901][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1788.783815][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1788.811935][T23615] device syzkaller0 entered promiscuous mode [ 1788.834606][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1788.842720][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1788.851853][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1788.860662][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1788.881412][T23580] device veth0_vlan entered promiscuous mode [ 1788.910153][T23580] device veth1_macvtap entered promiscuous mode [ 1788.950350][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1788.970401][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1788.978949][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1789.001277][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1789.070362][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1789.085269][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1789.093666][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1789.177939][ T7468] device ÿÿÿÿÿÿ left promiscuous mode [ 1789.183631][ T7468] Ÿë: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1789.196181][ T7468] device bridge_slave_1 left promiscuous mode [ 1789.202525][ T7468] bridge0: port 2(bridge_slave_1) entered disabled state [ 1789.240739][ T7468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1789.298522][ T7468] device veth1_macvtap left promiscuous mode [ 1789.529667][T23665] IPv6: pim6reg1: Disabled Multicast RS [ 1789.812048][T23689] device wg2 entered promiscuous mode [ 1789.902239][T23700] device syzkaller0 entered promiscuous mode [ 1789.923695][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1789.937060][T23700] device syzkaller0 left promiscuous mode [ 1789.945338][T23700] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1790.128181][T23718] device wg2 left promiscuous mode [ 1790.229325][T23718] device wg2 entered promiscuous mode [ 1790.866277][T23756] device wg2 entered promiscuous mode [ 1791.361861][T23809] device macsec0 entered promiscuous mode [ 1791.377943][T23809] device veth1_macvtap left promiscuous mode [ 1791.768581][T23830] bridge0: port 1(bridge_slave_0) entered blocking state [ 1791.775761][T23830] bridge0: port 1(bridge_slave_0) entered disabled state [ 1791.784131][T23830] device bridge_slave_0 entered promiscuous mode [ 1791.791439][T23830] bridge0: port 2(bridge_slave_1) entered blocking state [ 1791.798947][T23830] bridge0: port 2(bridge_slave_1) entered disabled state [ 1791.806592][T23830] device bridge_slave_1 entered promiscuous mode [ 1791.869939][T23830] bridge0: port 2(bridge_slave_1) entered blocking state [ 1791.876988][T23830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1791.884333][T23830] bridge0: port 1(bridge_slave_0) entered blocking state [ 1791.891384][T23830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1791.917912][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1791.963822][ T1938] bridge0: port 1(bridge_slave_0) entered disabled state [ 1792.001167][ T1938] bridge0: port 2(bridge_slave_1) entered disabled state [ 1792.013523][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1792.029601][ T1938] bridge0: port 1(bridge_slave_0) entered blocking state [ 1792.036950][ T1938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1792.084712][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1792.118096][ T1938] bridge0: port 2(bridge_slave_1) entered blocking state [ 1792.125354][ T1938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1792.180381][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1792.267630][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1792.310553][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1792.337693][T23830] device veth0_vlan entered promiscuous mode [ 1792.354623][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1792.370117][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1792.382951][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1792.428476][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1792.473885][T23830] device veth1_macvtap entered promiscuous mode [ 1792.493526][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1792.536158][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1792.546573][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1792.595720][T23865] device vlan0 entered promiscuous mode [ 1793.495418][T23877] device syzkaller0 entered promiscuous mode [ 1793.678548][T23900] device syzkaller0 entered promiscuous mode [ 1793.693559][T23904] device sit0 left promiscuous mode [ 1793.937687][T23918] device sit0 entered promiscuous mode [ 1794.074076][T23930] device syzkaller0 entered promiscuous mode [ 1794.769327][T23984] device wg2 left promiscuous mode [ 1795.688004][T24000] ªªªªªª™™: renamed from vlan0 [ 1796.006604][T24023] device syzkaller0 entered promiscuous mode [ 1797.650547][T24148] device syzkaller0 entered promiscuous mode [ 1798.617012][T24218] device xfrm0 entered promiscuous mode [ 1800.244585][T24273] device lo entered promiscuous mode [ 1801.950441][T24363] device syzkaller0 entered promiscuous mode [ 1803.761702][T24486] device syzkaller0 entered promiscuous mode [ 1804.255609][T24540] device syzkaller0 entered promiscuous mode [ 1804.677335][T24579] device veth1_macvtap left promiscuous mode [ 1804.685751][T24579] device veth1_macvtap entered promiscuous mode [ 1804.692178][T24579] device macsec0 entered promiscuous mode [ 1806.266519][T24681] device sit0 entered promiscuous mode [ 1808.094689][T24775] device syzkaller0 entered promiscuous mode [ 1808.867023][T24818] device syzkaller0 entered promiscuous mode [ 1809.466838][T24862] device veth0_vlan left promiscuous mode [ 1809.517904][T24862] device veth0_vlan entered promiscuous mode [ 1809.649483][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1809.662164][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1809.675511][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1810.945229][T24935] device syzkaller0 entered promiscuous mode [ 1815.505752][T25116] device wg2 left promiscuous mode [ 1815.512738][T25116] device wg2 entered promiscuous mode [ 1815.879704][T25135] device syzkaller0 entered promiscuous mode [ 1817.918464][T25236] device syzkaller0 entered promiscuous mode [ 1820.703428][T25341] device syzkaller0 entered promiscuous mode [ 1822.270712][T25378] ±ÿ: renamed from team_slave_1 [ 1822.514131][T25405] device wg2 entered promiscuous mode [ 1822.663991][T25410] syz.5.25841[25410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1822.664055][T25410] syz.5.25841[25410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1822.722986][T25412] device wg2 left promiscuous mode [ 1822.748958][T25412] device wg2 entered promiscuous mode [ 1826.640875][T25535] bridge0: port 1(bridge_slave_0) entered blocking state [ 1826.657166][T25535] bridge0: port 1(bridge_slave_0) entered disabled state [ 1826.665862][T25535] device bridge_slave_0 entered promiscuous mode [ 1826.713114][T25535] bridge0: port 2(bridge_slave_1) entered blocking state [ 1826.745338][T25535] bridge0: port 2(bridge_slave_1) entered disabled state [ 1826.769348][T25535] device bridge_slave_1 entered promiscuous mode [ 1827.002839][T25535] bridge0: port 2(bridge_slave_1) entered blocking state [ 1827.010106][T25535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1827.017443][T25535] bridge0: port 1(bridge_slave_0) entered blocking state [ 1827.024555][T25535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1827.109021][ T7468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1827.120039][ T7468] bridge0: port 2(bridge_slave_1) entered disabled state [ 1827.134725][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1827.150013][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1827.183557][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1827.196365][ T7468] bridge0: port 1(bridge_slave_0) entered blocking state [ 1827.203452][ T7468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1827.221483][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1827.253557][ T7468] bridge0: port 2(bridge_slave_1) entered blocking state [ 1827.260654][ T7468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1827.312451][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1827.358539][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1827.415837][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1827.480666][T25535] device veth0_vlan entered promiscuous mode [ 1827.490308][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1827.528482][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1827.560636][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1827.735097][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1827.792364][T25535] device veth1_macvtap entered promiscuous mode [ 1827.806625][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1827.816436][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1827.943092][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1828.047901][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1830.750723][T25695] tap0: tun_chr_ioctl cmd 1074025677 [ 1830.756134][T25695] tap0: linktype set to 805 [ 1830.761373][T25695] tap0: tun_chr_ioctl cmd 2147767520 [ 1832.006092][T25758] device wg2 left promiscuous mode [ 1832.181252][T25769] bridge0: port 2(bridge_slave_1) entered disabled state [ 1832.188466][T25769] bridge0: port 1(bridge_slave_0) entered disabled state [ 1832.244846][T25769] device bridge_slave_1 left promiscuous mode [ 1832.251409][T25769] bridge0: port 2(bridge_slave_1) entered disabled state [ 1832.260453][T25769] device bridge_slave_0 left promiscuous mode [ 1832.266764][T25769] bridge0: port 1(bridge_slave_0) entered disabled state [ 1832.375540][T25782] device syzkaller0 entered promiscuous mode [ 1833.945058][T25884] syz.3.25975[25884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1833.945192][T25884] syz.3.25975[25884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1834.064401][T25896] device syzkaller0 entered promiscuous mode [ 1834.696522][T25956] : port 1(syz_tun) entered blocking state [ 1834.710471][T25956] : port 1(syz_tun) entered disabled state [ 1834.728501][T25956] device syz_tun entered promiscuous mode [ 1835.548672][T26006] device syzkaller0 entered promiscuous mode [ 1836.175593][T26050] device lo left promiscuous mode [ 1836.451095][T26047] bridge0: port 1(bridge_slave_0) entered blocking state [ 1836.527948][T26047] bridge0: port 1(bridge_slave_0) entered disabled state [ 1836.603938][T26047] device bridge_slave_0 entered promiscuous mode [ 1836.691063][T26047] bridge0: port 2(bridge_slave_1) entered blocking state [ 1836.698801][T26047] bridge0: port 2(bridge_slave_1) entered disabled state [ 1836.706247][T26047] device bridge_slave_1 entered promiscuous mode [ 1836.946300][T26047] bridge0: port 2(bridge_slave_1) entered blocking state [ 1836.953389][T26047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1836.960693][T26047] bridge0: port 1(bridge_slave_0) entered blocking state [ 1836.967735][T26047] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1837.091217][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1837.104549][ T7468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1837.116787][ T7468] bridge0: port 2(bridge_slave_1) entered disabled state [ 1837.186209][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1837.232840][ T7468] bridge0: port 1(bridge_slave_0) entered blocking state [ 1837.239915][ T7468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1837.347014][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1837.393145][ T7468] bridge0: port 2(bridge_slave_1) entered blocking state [ 1837.400229][ T7468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1837.485836][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1837.574936][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1837.722795][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1837.731652][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1837.856979][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1837.867579][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1837.875865][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1837.884019][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1837.900041][T26047] device veth0_vlan entered promiscuous mode [ 1837.915633][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1837.924578][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1837.936019][T26047] device veth1_macvtap entered promiscuous mode [ 1837.951563][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1837.961958][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1837.972725][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1837.981807][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1837.997624][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1838.035795][T26117] device syzkaller0 entered promiscuous mode [ 1838.106353][T26124] batadv0: tun_chr_ioctl cmd 2148553947 [ 1838.183484][T26134] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 1838.276222][T26136] device syzkaller0 entered promiscuous mode [ 1839.343187][ T1938] device veth1_macvtap left promiscuous mode [ 1839.386842][ T1938] device veth0_vlan left promiscuous mode [ 1839.747250][T26204] nr0: port 1(macsec0) entered blocking state [ 1839.755608][T26204] nr0: port 1(macsec0) entered disabled state [ 1839.765675][T26204] device macsec0 entered promiscuous mode [ 1841.968354][T26266] device syzkaller0 entered promiscuous mode [ 1842.667865][T26310] device wg2 entered promiscuous mode [ 1842.744787][T26313] device syzkaller0 entered promiscuous mode [ 1843.656948][T26353] nr0: port 1(macsec0) entered blocking state [ 1843.663756][T26353] nr0: port 1(macsec0) entered disabled state [ 1843.670835][T26353] device macsec0 entered promiscuous mode [ 1844.201897][T26386] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1844.210899][T26386] device syzkaller0 entered promiscuous mode [ 1845.537047][T26433] ÿÿÿÿÿÿ: renamed from vlan1 [ 1846.721051][T26535] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 1847.676225][T26613] device syzkaller0 entered promiscuous mode [ 1847.966085][T26627] device syzkaller0 entered promiscuous mode [ 1848.576216][T26648] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1848.632445][T26648] device syzkaller0 entered promiscuous mode [ 1849.556205][T26691] device syzkaller0 entered promiscuous mode [ 1849.772884][T26729] device syzkaller0 entered promiscuous mode [ 1849.839767][T26737] device syzkaller0 entered promiscuous mode [ 1849.950835][T26763] device syzkaller0 left promiscuous mode [ 1850.095859][T26777] device syzkaller0 entered promiscuous mode [ 1850.876793][T26844] Â: renamed from pim6reg1 [ 1851.089996][T26866] device sit0 left promiscuous mode [ 1851.118034][T26866] device sit0 entered promiscuous mode [ 1851.813399][T26956] -1: renamed from syzkaller0 [ 1852.049709][T26976] device syzkaller0 entered promiscuous mode [ 1853.337929][T27048] device syzkaller0 entered promiscuous mode [ 1854.455290][T27105] device syzkaller0 entered promiscuous mode [ 1854.703575][T27122] device syzkaller0 entered promiscuous mode [ 1855.084757][T27171] device wg2 left promiscuous mode [ 1855.154398][T27171] device syzkaller0 entered promiscuous mode [ 1855.187170][T27171] device wg2 entered promiscuous mode [ 1857.060780][T27287] device veth1_macvtap left promiscuous mode [ 1858.152044][T27327] syz.2.26410[27327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1858.152135][T27327] syz.2.26410[27327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1861.172534][T27507] : port 2(ip6gretap0) entered blocking state [ 1861.263767][T27507] : port 2(ip6gretap0) entered disabled state [ 1861.277675][T27507] device ip6gretap0 entered promiscuous mode [ 1861.300904][T27515] device ip6gretap0 left promiscuous mode [ 1861.321767][T27515] : port 2(ip6gretap0) entered disabled state [ 1865.180830][T27712] device veth1_macvtap left promiscuous mode [ 1871.777036][T28033] ªªªªªª™™: renamed from vlan0 [ 1873.265147][T28159] bridge0: port 2(bridge_slave_1) entered disabled state [ 1873.272519][T28159] bridge0: port 1(bridge_slave_0) entered disabled state [ 1875.750766][T28292] device veth0_vlan left promiscuous mode [ 1875.791484][T28292] device veth0_vlan entered promiscuous mode [ 1875.960150][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1875.971384][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 1876.010137][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1876.171156][T28322] device syz_tun entered promiscuous mode [ 1878.491554][T28414] syz.7.26728[28414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1878.491620][T28414] syz.7.26728[28414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1880.775436][T28476] device wg2 entered promiscuous mode [ 1882.922716][T28555] ÿÿÿÿÿÿ: renamed from vlan1 [ 1882.929528][T28559] syz.7.26770[28559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1882.929586][T28559] syz.7.26770[28559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1883.200460][T28573] ÿÿÿÿÿÿ: renamed from vlan1 [ 1883.219477][T28570] ªªªªªªÿÿ: renamed from vlan0 [ 1883.331212][T28580] lo: mtu less than device minimum [ 1883.734865][T28612] FAULT_INJECTION: forcing a failure. [ 1883.734865][T28612] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1883.786121][T28612] CPU: 1 PID: 28612 Comm: syz.6.26788 Tainted: G W syzkaller #0 [ 1883.795175][T28612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1883.805559][T28612] Call Trace: [ 1883.808861][T28612] __dump_stack+0x21/0x24 [ 1883.813274][T28612] dump_stack_lvl+0x1a7/0x208 [ 1883.817934][T28612] ? show_regs_print_info+0x18/0x18 [ 1883.823121][T28612] dump_stack+0x15/0x1c [ 1883.827336][T28612] should_fail+0x3c1/0x510 [ 1883.831891][T28612] should_fail_usercopy+0x1a/0x20 [ 1883.837080][T28612] _copy_from_user+0x20/0xd0 [ 1883.841655][T28612] sock_do_ioctl+0x1d8/0x380 [ 1883.846236][T28612] ? sched_clock+0x3a/0x40 [ 1883.850633][T28612] ? sock_show_fdinfo+0xa0/0xa0 [ 1883.855529][T28612] ? sched_clock_cpu+0x1b/0x3d0 [ 1883.860368][T28612] ? selinux_file_ioctl+0x3a0/0x4d0 [ 1883.865633][T28612] sock_ioctl+0x4bd/0x760 [ 1883.869935][T28612] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1883.876136][T28612] ? sock_poll+0x350/0x350 [ 1883.880552][T28612] ? security_file_ioctl+0x84/0xa0 [ 1883.885636][T28612] ? sock_poll+0x350/0x350 [ 1883.890126][T28612] __se_sys_ioctl+0x121/0x1a0 [ 1883.894776][T28612] __x64_sys_ioctl+0x7b/0x90 [ 1883.899353][T28612] do_syscall_64+0x31/0x40 [ 1883.903746][T28612] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1883.909611][T28612] RIP: 0033:0x7fcbca7ff819 [ 1883.914005][T28612] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1883.933673][T28612] RSP: 002b:00007fcbc925a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1883.942149][T28612] RAX: ffffffffffffffda RBX: 00007fcbcaa78fa0 RCX: 00007fcbca7ff819 [ 1883.950190][T28612] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000002b [ 1883.958174][T28612] RBP: 00007fcbc925a090 R08: 0000000000000000 R09: 0000000000000000 [ 1883.966132][T28612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1883.974079][T28612] R13: 00007fcbcaa79038 R14: 00007fcbcaa78fa0 R15: 00007ffd3490bb68 [ 1884.774509][T28654] FAULT_INJECTION: forcing a failure. [ 1884.774509][T28654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1884.873749][T28654] CPU: 1 PID: 28654 Comm: syz.6.26801 Tainted: G W syzkaller #0 [ 1884.882710][T28654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1884.892928][T28654] Call Trace: [ 1884.896218][T28654] __dump_stack+0x21/0x24 [ 1884.900551][T28654] dump_stack_lvl+0x1a7/0x208 [ 1884.905231][T28654] ? show_regs_print_info+0x18/0x18 [ 1884.910432][T28654] dump_stack+0x15/0x1c [ 1884.914756][T28654] should_fail+0x3c1/0x510 [ 1884.919167][T28654] should_fail_usercopy+0x1a/0x20 [ 1884.924212][T28654] _copy_from_user+0x20/0xd0 [ 1884.928876][T28654] dev_ethtool+0x157/0xed0 [ 1884.933381][T28654] ? __kasan_check_read+0x11/0x20 [ 1884.938395][T28654] ? preempt_schedule_notrace+0x120/0x120 [ 1884.944188][T28654] ? netdev_rss_key_fill+0x150/0x150 [ 1884.949471][T28654] ? __kasan_check_write+0x14/0x20 [ 1884.954700][T28654] ? mutex_lock+0x92/0xf0 [ 1884.959034][T28654] ? mutex_trylock+0xa0/0xa0 [ 1884.963793][T28654] ? full_name_hash+0xa0/0xf0 [ 1884.968758][T28654] dev_ioctl+0x46d/0xb80 [ 1884.973098][T28654] sock_do_ioctl+0x27b/0x380 [ 1884.977820][T28654] ? __irq_exit_rcu+0x40/0x150 [ 1884.982608][T28654] ? sock_show_fdinfo+0xa0/0xa0 [ 1884.987451][T28654] ? irq_exit_rcu+0x9/0x10 [ 1884.991943][T28654] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1884.997744][T28654] sock_ioctl+0x4bd/0x760 [ 1885.002061][T28654] ? sock_poll+0x350/0x350 [ 1885.006468][T28654] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1885.012620][T28654] ? sock_poll+0x350/0x350 [ 1885.017141][T28654] __se_sys_ioctl+0x121/0x1a0 [ 1885.022013][T28654] __x64_sys_ioctl+0x7b/0x90 [ 1885.026596][T28654] do_syscall_64+0x31/0x40 [ 1885.031194][T28654] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1885.037164][T28654] RIP: 0033:0x7fcbca7ff819 [ 1885.041585][T28654] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1885.061366][T28654] RSP: 002b:00007fcbc925a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1885.069863][T28654] RAX: ffffffffffffffda RBX: 00007fcbcaa78fa0 RCX: 00007fcbca7ff819 [ 1885.077933][T28654] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000002b [ 1885.085919][T28654] RBP: 00007fcbc925a090 R08: 0000000000000000 R09: 0000000000000000 [ 1885.093974][T28654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1885.101956][T28654] R13: 00007fcbcaa79038 R14: 00007fcbcaa78fa0 R15: 00007ffd3490bb68 [ 1885.413033][T28692] device sit0 left promiscuous mode [ 1885.454268][T28692] device sit0 entered promiscuous mode [ 1887.356678][T28805] @0Ù: renamed from bond_slave_1 [ 1889.625834][T28985] device wg2 left promiscuous mode [ 1889.641254][T28990] device wg2 entered promiscuous mode [ 1890.180395][T29007] cgroup: fork rejected by pids controller in /syz6 [ 1890.504501][ T24] audit: type=1400 audit(1775204832.040:182): avc: denied { create } for pid=29129 comm="syz-executor" name="tun" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 1890.579454][ T24] audit: type=1400 audit(1775204832.040:183): avc: denied { setattr } for pid=29129 comm="syz-executor" name="tun" dev="devtmpfs" ino=520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 1890.585114][T29129] bridge0: port 1(bridge_slave_0) entered blocking state [ 1890.627213][ T24] audit: type=1400 audit(1775204832.040:184): avc: denied { read write } for pid=29129 comm="syz-executor" name="tun" dev="devtmpfs" ino=520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 1890.654148][T29129] bridge0: port 1(bridge_slave_0) entered disabled state [ 1890.684210][T29129] device bridge_slave_0 entered promiscuous mode [ 1890.691548][ T24] audit: type=1400 audit(1775204832.040:185): avc: denied { open } for pid=29129 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 1890.772052][T29129] bridge0: port 2(bridge_slave_1) entered blocking state [ 1890.787439][ T24] audit: type=1400 audit(1775204832.040:186): avc: denied { ioctl } for pid=29129 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=520 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 1890.813174][T29129] bridge0: port 2(bridge_slave_1) entered disabled state [ 1890.827546][T29129] device bridge_slave_1 entered promiscuous mode [ 1890.967089][T29129] bridge0: port 2(bridge_slave_1) entered blocking state [ 1890.974655][T29129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1890.981962][T29129] bridge0: port 1(bridge_slave_0) entered blocking state [ 1890.989005][T29129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1891.068535][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1891.078595][ T1938] bridge0: port 1(bridge_slave_0) entered disabled state [ 1891.138141][ T1938] bridge0: port 2(bridge_slave_1) entered disabled state [ 1891.185688][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1891.237408][ T1938] bridge0: port 1(bridge_slave_0) entered blocking state [ 1891.244484][ T1938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1891.279124][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1891.292960][ T1938] bridge0: port 2(bridge_slave_1) entered blocking state [ 1891.300056][ T1938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1891.316228][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1891.345132][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1891.411679][T29129] device veth0_vlan entered promiscuous mode [ 1891.440419][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1891.455668][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1891.478246][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1891.490598][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1891.526941][T29129] device veth1_macvtap entered promiscuous mode [ 1891.537093][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1891.547773][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1891.566528][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1891.612562][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1891.624240][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1891.660032][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1891.671876][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1891.733487][T29180] device syzkaller0 entered promiscuous mode [ 1892.393782][ T7468] device bridge_slave_1 left promiscuous mode [ 1892.405354][ T7468] bridge0: port 2(bridge_slave_1) entered disabled state [ 1892.419526][ T7468] device bridge_slave_0 left promiscuous mode [ 1892.434701][ T7468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1893.214524][T29219] device syzkaller0 entered promiscuous mode [ 1894.470643][ T24] audit: type=1400 audit(1775204836.010:187): avc: denied { append } for pid=29262 comm="syz.5.26944" name="tun" dev="devtmpfs" ino=520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 1899.053967][T29400] device syzkaller0 entered promiscuous mode [ 1899.901468][T29439] device syzkaller0 entered promiscuous mode [ 1900.257069][T29471] device syzkaller0 entered promiscuous mode [ 1902.023649][T29527] device syzkaller0 entered promiscuous mode [ 1903.167329][T29596] device lo entered promiscuous mode [ 1903.515337][T29627] device syzkaller0 entered promiscuous mode [ 1904.774923][T29661] syz.2.27052[29661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1904.774982][T29661] syz.2.27052[29661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1904.806808][T29669] bridge0: port 2(bridge_slave_1) entered disabled state [ 1904.826165][T29669] bridge0: port 1(bridge_slave_0) entered disabled state [ 1904.851390][T29669] device bridge_slave_1 left promiscuous mode [ 1904.857924][T29669] bridge0: port 2(bridge_slave_1) entered disabled state [ 1905.079060][T29669] device bridge_slave_0 left promiscuous mode [ 1905.137291][T29669] bridge0: port 1(bridge_slave_0) entered disabled state [ 1905.324960][T29716] bridge0: port 3(veth1_macvtap) entered blocking state [ 1905.339436][T29716] bridge0: port 3(veth1_macvtap) entered disabled state [ 1905.852300][T29749] device syzkaller0 entered promiscuous mode [ 1906.937910][T29835] device syzkaller0 entered promiscuous mode [ 1908.007825][T29911] device syzkaller0 entered promiscuous mode [ 1908.859433][T29983] batadv0: tun_chr_ioctl cmd 1074025677 [ 1908.866564][T29983] batadv0: linktype set to 804 [ 1909.281662][T30005] syz.6.27157[30005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1909.281766][T30005] syz.6.27157[30005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1911.614175][T30082] +: renamed from team_slave_1 [ 1912.296440][T30113] device syzkaller0 entered promiscuous mode [ 1912.343249][T30116] device syzkaller0 entered promiscuous mode [ 1912.562825][T30125] device syzkaller0 entered promiscuous mode [ 1912.821956][T30140] device syzkaller0 entered promiscuous mode [ 1913.366178][T30158] device syzkaller0 entered promiscuous mode [ 1920.432329][T30272] syz.7.27236[30272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1920.432391][T30272] syz.7.27236[30272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1920.738178][T30283] bridge0: port 1(bridge_slave_0) entered blocking state [ 1920.757091][T30283] bridge0: port 1(bridge_slave_0) entered disabled state [ 1920.764688][T30283] device bridge_slave_0 entered promiscuous mode [ 1920.771718][T30283] bridge0: port 2(bridge_slave_1) entered blocking state [ 1920.781616][T30283] bridge0: port 2(bridge_slave_1) entered disabled state [ 1920.794314][T30283] device bridge_slave_1 entered promiscuous mode [ 1921.081358][T30283] bridge0: port 2(bridge_slave_1) entered blocking state [ 1921.088595][T30283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1921.095958][T30283] bridge0: port 1(bridge_slave_0) entered blocking state [ 1921.103026][T30283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1921.135480][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1921.145918][T10248] bridge0: port 1(bridge_slave_0) entered disabled state [ 1921.156709][T10248] bridge0: port 2(bridge_slave_1) entered disabled state [ 1921.173961][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1921.182213][T10248] bridge0: port 1(bridge_slave_0) entered blocking state [ 1921.189387][T10248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1921.198341][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1921.206659][T10248] bridge0: port 2(bridge_slave_1) entered blocking state [ 1921.213794][T10248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1921.246856][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1921.255017][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1921.280585][T30283] device veth0_vlan entered promiscuous mode [ 1921.297729][T30283] device veth1_macvtap entered promiscuous mode [ 1921.308017][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1921.321867][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1921.335636][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1921.344287][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1921.357462][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1921.387216][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1921.430316][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1921.450191][T30332] bridge0: port 2(bridge_slave_1) entered disabled state [ 1921.458269][T30332] bridge0: port 1(bridge_slave_0) entered disabled state [ 1921.918529][T30400] -1: renamed from syzkaller0 [ 1925.001827][T30586] device syzkaller0 entered promiscuous mode [ 1925.566378][T30616] device syzkaller0 entered promiscuous mode [ 1926.425948][T30646] bridge0: port 1(bridge_slave_0) entered blocking state [ 1926.441963][T30646] bridge0: port 1(bridge_slave_0) entered disabled state [ 1926.459024][T30646] device bridge_slave_0 entered promiscuous mode [ 1926.493848][T30646] bridge0: port 2(bridge_slave_1) entered blocking state [ 1926.513428][T30646] bridge0: port 2(bridge_slave_1) entered disabled state [ 1926.528577][T30646] device bridge_slave_1 entered promiscuous mode [ 1926.865522][T30646] bridge0: port 2(bridge_slave_1) entered blocking state [ 1926.872608][T30646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1926.879902][T30646] bridge0: port 1(bridge_slave_0) entered blocking state [ 1926.886913][T30646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1926.978202][T30666] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1927.107739][T30666] device syzkaller0 entered promiscuous mode [ 1927.185174][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1927.199083][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1927.285793][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1927.298351][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1927.323186][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1927.346424][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1927.365895][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1927.373011][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1927.386109][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1927.398163][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1927.430155][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 1927.437252][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1927.444858][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1927.464307][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1927.519040][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1927.578345][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1927.603791][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1927.617889][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1927.642068][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1927.650671][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1927.660631][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1927.668437][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1927.687359][T30646] device veth0_vlan entered promiscuous mode [ 1927.721166][T30695] device syzkaller0 entered promiscuous mode [ 1927.748568][T30695] device syzkaller0 left promiscuous mode [ 1927.770698][T30646] device veth1_macvtap entered promiscuous mode [ 1927.784846][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1927.806967][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1927.815623][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1927.833344][T18274] device bridge_slave_1 left promiscuous mode [ 1927.848079][T18274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1927.869387][T18274] device bridge_slave_0 left promiscuous mode [ 1927.879923][T18274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1927.898960][T18274] device veth1_macvtap left promiscuous mode [ 1927.904994][T18274] device veth0_vlan left promiscuous mode [ 1928.210625][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1928.219322][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1928.229399][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1928.237778][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1928.348860][T30726] batadv0: tun_chr_ioctl cmd 2148553947 [ 1930.737002][T30812] device syzkaller0 entered promiscuous mode [ 1931.382921][T30858] device syzkaller0 entered promiscuous mode [ 1931.987017][T30869] device syzkaller0 entered promiscuous mode [ 1932.307500][T30873] device wg2 entered promiscuous mode [ 1932.313239][T30873] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 1932.424877][T30876] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 1934.853351][T30939] device syzkaller0 entered promiscuous mode [ 1934.926024][T30938] device syzkaller0 entered promiscuous mode [ 1934.958177][T30924] device sit0 entered promiscuous mode [ 1936.438414][T31003] device pim6reg1 entered promiscuous mode [ 1938.568579][T31076] : port 1(ip6gretap0) entered blocking state [ 1938.574815][T31076] : port 1(ip6gretap0) entered disabled state [ 1938.582867][T31076] device ip6gretap0 entered promiscuous mode [ 1938.594856][T31076] device ip6gretap0 left promiscuous mode [ 1938.601714][T31076] : port 1(ip6gretap0) entered disabled state [ 1939.263683][T31129] device syzkaller0 entered promiscuous mode [ 1939.290826][T31139] ³þ: renamed from bond_slave_0 [ 1940.135404][T31210] device syzkaller0 entered promiscuous mode [ 1940.362993][T31233] device syzkaller0 entered promiscuous mode [ 1940.980910][T31251] device syzkaller0 entered promiscuous mode [ 1941.324539][T31272] device syzkaller0 entered promiscuous mode [ 1941.515627][T31263] device syzkaller0 left promiscuous mode [ 1942.345350][T31353] bridge0: port 3(gretap0) entered blocking state [ 1942.352001][T31353] bridge0: port 3(gretap0) entered disabled state [ 1942.358821][T31353] device gretap0 entered promiscuous mode [ 1942.364722][T31353] bridge0: port 3(gretap0) entered blocking state [ 1942.371242][T31353] bridge0: port 3(gretap0) entered forwarding state [ 1943.677191][T31453] device dummy0 entered promiscuous mode [ 1945.075018][T31522] device syzkaller0 entered promiscuous mode [ 1945.081332][T31522] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1948.932306][T31658] device syzkaller0 entered promiscuous mode [ 1949.003041][T31661] device syzkaller0 entered promiscuous mode [ 1949.211919][T31681] device syzkaller0 entered promiscuous mode [ 1950.101523][T31714] device syzkaller0 entered promiscuous mode [ 1951.813582][T31799] device veth1_macvtap left promiscuous mode [ 1951.881775][T31799] device veth1_macvtap entered promiscuous mode [ 1951.891429][T31799] device macsec0 entered promiscuous mode [ 1952.707050][T31821] device syzkaller0 entered promiscuous mode [ 1953.824206][T31838] device syzkaller0 entered promiscuous mode [ 1954.319885][T31881] device syzkaller0 entered promiscuous mode [ 1954.334277][T31881] device syzkaller0 left promiscuous mode [ 1956.192278][T31962] bridge0: port 4(veth1_macvtap) entered blocking state [ 1956.313413][T31962] bridge0: port 4(veth1_macvtap) entered disabled state [ 1958.797966][T32031] device syzkaller0 entered promiscuous mode [ 1958.899026][T32039] : port 1(syz_tun) entered blocking state [ 1958.905231][T32039] : port 1(syz_tun) entered disabled state [ 1958.912490][T32039] device syz_tun entered promiscuous mode [ 1959.546578][T32064] device syzkaller0 entered promiscuous mode [ 1959.986868][T32104] bridge0: port 1(bridge_slave_0) entered blocking state [ 1959.996411][T32104] bridge0: port 1(bridge_slave_0) entered disabled state [ 1960.005869][T32104] device bridge_slave_0 entered promiscuous mode [ 1960.013075][T32104] bridge0: port 2(bridge_slave_1) entered blocking state [ 1960.020270][T32104] bridge0: port 2(bridge_slave_1) entered disabled state [ 1960.027905][T32104] device bridge_slave_1 entered promiscuous mode [ 1960.084707][T32104] bridge0: port 2(bridge_slave_1) entered blocking state [ 1960.092198][T32104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1960.099652][T32104] bridge0: port 1(bridge_slave_0) entered blocking state [ 1960.106740][T32104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1960.159033][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1960.166973][T10248] bridge0: port 1(bridge_slave_0) entered disabled state [ 1960.185205][T10248] bridge0: port 2(bridge_slave_1) entered disabled state [ 1960.212879][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1960.221751][T10248] bridge0: port 1(bridge_slave_0) entered blocking state [ 1960.228916][T10248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1960.236920][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1960.245650][T10248] bridge0: port 2(bridge_slave_1) entered blocking state [ 1960.252736][T10248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1960.266104][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1960.295132][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1960.370730][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1960.391972][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1960.407065][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1960.418617][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1960.438339][T32104] device veth0_vlan entered promiscuous mode [ 1960.536178][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1960.545835][T32104] device veth1_macvtap entered promiscuous mode [ 1960.571864][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1960.587428][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1960.994242][T32220] device syzkaller0 entered promiscuous mode [ 1961.459356][T18274] bridge0: port 3(gretap0) entered disabled state [ 1961.467391][T18274] device gretap0 left promiscuous mode [ 1961.473000][T18274] bridge0: port 3(gretap0) entered disabled state [ 1961.543155][T32263] device syzkaller0 entered promiscuous mode [ 1961.639859][T32271] Ÿë: port 1(vlan1) entered blocking state [ 1961.645784][T32271] Ÿë: port 1(vlan1) entered disabled state [ 1961.736085][T32271] device vlan1 entered promiscuous mode [ 1961.927530][T32287] : port 1(syz_tun) entered blocking state [ 1961.988412][T32287] : port 1(syz_tun) entered disabled state [ 1961.995119][T32287] device syz_tun entered promiscuous mode [ 1962.009395][T18274] device bridge_slave_1 left promiscuous mode [ 1962.019993][T18274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1962.047733][T18274] device bridge_slave_0 left promiscuous mode [ 1962.053969][T18274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1962.081986][T18274] device veth1_macvtap left promiscuous mode [ 1962.089490][T18274] device veth0_vlan left promiscuous mode [ 1962.276354][T32310] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 1963.605002][T32350] device wg2 left promiscuous mode [ 1964.634910][T32373] device bridge_slave_0 entered promiscuous mode [ 1965.478506][T32409] device syzkaller0 entered promiscuous mode [ 1966.174865][T32450] device sit0 entered promiscuous mode [ 1970.405288][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1970.413787][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1970.707517][T32721] device bridge_slave_0 left promiscuous mode [ 1970.754983][T32732] device syzkaller0 entered promiscuous mode [ 1971.719964][ T374] device syzkaller0 entered promiscuous mode [ 1973.438544][ T478] device wg2 entered promiscuous mode [ 1974.507508][ T538] device syzkaller0 entered promiscuous mode [ 1975.946754][ T609] ÿÿÿÿÿÿ: renamed from vlan1 [ 1976.187723][ T641] syz.6.28044[641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1976.187783][ T641] syz.6.28044[641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1977.613582][ T730] tap0: tun_chr_ioctl cmd 1074025677 [ 1977.644081][ T730] tap0: linktype set to 805 [ 1978.220570][ T756] batadv0: tun_chr_ioctl cmd 2147767521 [ 1978.374009][ T764] : port 1(ip6gretap0) entered blocking state [ 1978.380413][ T764] : port 1(ip6gretap0) entered disabled state [ 1978.387034][ T764] device ip6gretap0 entered promiscuous mode [ 1978.395661][ T764] device ip6gretap0 left promiscuous mode [ 1978.401822][ T764] : port 1(ip6gretap0) entered disabled state [ 1978.521759][ T771] bridge0: port 2(bridge_slave_1) entered blocking state [ 1978.528950][ T771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1978.536258][ T771] bridge0: port 1(bridge_slave_0) entered blocking state [ 1978.543389][ T771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1978.779081][ T771] device bridge0 entered promiscuous mode [ 1978.785339][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1979.847896][ T844] device syzkaller0 entered promiscuous mode [ 1979.963478][ T857] syzkaller0: mtu less than device minimum [ 1979.983168][ T874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1980.066635][ T885] ªªªªªª™™: renamed from vlan0 [ 1980.312076][ T913] @ÿ: renamed from bond_slave_0 [ 1981.001097][ T961] IPv6: pim6reg1: Disabled Multicast RS [ 1982.182357][ T1002] device syzkaller0 entered promiscuous mode [ 1982.197346][ T1002] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1982.227321][ T1009] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 1982.262390][ T1009] device wg2 left promiscuous mode [ 1982.433450][ T1034] Ÿë: port 1(veth0_to_team) entered blocking state [ 1982.452359][ T1034] Ÿë: port 1(veth0_to_team) entered disabled state [ 1982.460648][ T1034] device veth0_to_team entered promiscuous mode [ 1983.393233][ T1066] device wg2 entered promiscuous mode [ 1984.815737][ T1185] bridge0: port 1(bridge_slave_0) entered disabled state [ 1985.412783][ T1212] device syzkaller0 entered promiscuous mode [ 1985.782985][ T1249] device syzkaller0 entered promiscuous mode [ 1985.897721][ T1257] device syzkaller0 entered promiscuous mode [ 1985.943190][ T1284] device wg2 entered promiscuous mode [ 1986.287589][ T1307] nr0: port 1(macsec0) entered blocking state [ 1986.297000][ T1307] nr0: port 1(macsec0) entered disabled state [ 1986.318678][ T1307] device macsec0 entered promiscuous mode [ 1986.329801][ T1308] nr0: port 1(macsec0) entered blocking state [ 1986.335901][ T1308] nr0: port 1(macsec0) entered forwarding state [ 1986.352418][ T1307] nr0: mtu less than device minimum [ 1986.362244][ T1308] nr0: mtu less than device minimum [ 1986.428117][ T1316] batadv0: tun_chr_ioctl cmd 2148553947 [ 1986.579315][ T1325] device syzkaller0 entered promiscuous mode [ 1986.952492][ T1371] geneve0: tun_chr_ioctl cmd 1074025677 [ 1986.963735][ T1371] geneve0: linktype set to 1 [ 1987.472321][ T1407] bridge0: port 2(bridge_slave_1) entered disabled state [ 1987.479569][ T1407] bridge0: port 1(bridge_slave_0) entered disabled state [ 1987.539592][ T1416] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 1987.906922][T23830] device syz_tun left promiscuous mode [ 1987.937176][T23830] : port 1(syz_tun) entered disabled state [ 1988.031537][ T1560] device syzkaller0 entered promiscuous mode [ 1988.062364][ T1568] device syzkaller0 entered promiscuous mode [ 1988.103927][ T1566] device syzkaller0 entered promiscuous mode [ 1988.154307][ T1560] device syzkaller0 left promiscuous mode [ 1988.279621][ T1575] bridge0: port 1(bridge_slave_0) entered blocking state [ 1988.286890][ T1575] bridge0: port 1(bridge_slave_0) entered disabled state [ 1988.294724][ T1575] device bridge_slave_0 entered promiscuous mode [ 1988.302550][ T1575] bridge0: port 2(bridge_slave_1) entered blocking state [ 1988.310077][ T1575] bridge0: port 2(bridge_slave_1) entered disabled state [ 1988.317767][ T1575] device bridge_slave_1 entered promiscuous mode [ 1988.496761][ T1575] bridge0: port 2(bridge_slave_1) entered blocking state [ 1988.503832][ T1575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1988.511127][ T1575] bridge0: port 1(bridge_slave_0) entered blocking state [ 1988.518264][ T1575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1988.756800][ T7468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1988.765493][ T7468] bridge0: port 2(bridge_slave_1) entered disabled state [ 1989.641696][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1989.649697][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1989.672332][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1989.681318][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1989.689869][T10248] bridge0: port 1(bridge_slave_0) entered blocking state [ 1989.696929][T10248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1989.714435][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1989.723076][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1989.731819][T10248] bridge0: port 2(bridge_slave_1) entered blocking state [ 1989.738965][T10248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1989.776144][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1989.784972][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1989.793821][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1989.802234][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1989.843106][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1989.851751][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1989.903726][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1989.932974][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1990.146823][ T1575] device veth0_vlan entered promiscuous mode [ 1990.153546][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1990.167480][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1990.422426][ T1575] device veth1_macvtap entered promiscuous mode [ 1990.537520][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1990.556706][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1990.580736][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1990.594631][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1990.619019][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1990.812166][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1990.820912][ T7468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1990.999955][T18274] device vlan1 left promiscuous mode [ 1991.026927][T18274] Ÿë: port 1(vlan1) entered disabled state [ 1991.106499][T18274] nr0: port 1(macsec0) entered disabled state [ 1991.117290][T18274] device bridge_slave_1 left promiscuous mode [ 1991.123832][T18274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1991.172031][T18274] device bridge_slave_0 left promiscuous mode [ 1991.183442][T18274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1993.118327][ T1719] bridge0: port 3(veth0_vlan) entered blocking state [ 1993.125400][ T1719] bridge0: port 3(veth0_vlan) entered disabled state [ 1993.133237][ T1719] bridge0: port 3(veth0_vlan) entered blocking state [ 1993.140004][ T1719] bridge0: port 3(veth0_vlan) entered forwarding state [ 1993.245504][ T1743] tap0: tun_chr_ioctl cmd 1074025673 [ 1993.252505][ T1740] tap0: tun_chr_ioctl cmd 1074812118 [ 1995.166941][ T1773] device syzkaller0 entered promiscuous mode [ 1996.597857][ T1852] device syzkaller0 entered promiscuous mode [ 1997.692072][ T1884] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1997.728927][ T1884] device syzkaller0 entered promiscuous mode [ 1998.147723][ T1904] device sit0 left promiscuous mode [ 1999.103083][ T1941] syz.6.28390[1941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1999.103246][ T1941] syz.6.28390[1941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2001.557449][ T2036] device wg2 entered promiscuous mode [ 2002.224123][ T2060] device veth1_macvtap left promiscuous mode [ 2002.305990][ T2060] nr0: port 1(macsec0) entered disabled state [ 2002.644881][ T2096] device syzkaller0 entered promiscuous mode [ 2002.829365][ T2103] lo: mtu less than device minimum [ 2003.314392][ T2164] device sit0 entered promiscuous mode [ 2005.823184][ T2285] device syzkaller0 entered promiscuous mode [ 2006.454375][ T2291] device wg2 entered promiscuous mode [ 2006.819985][ T2305] syz.5.28500[2305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2006.820039][ T2305] syz.5.28500[2305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2006.858787][ T2316] ref_ctr_offset mismatch. inode: 0xb75 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 2007.282252][ T2359] ref_ctr_offset mismatch. inode: 0x37d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 2007.550178][ T2390] device syzkaller0 entered promiscuous mode [ 2008.670620][ T2449] device syzkaller0 entered promiscuous mode [ 2011.280366][ T2573] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 2011.289205][ T2573] device syzkaller0 entered promiscuous mode [ 2012.366525][ T2603] device syzkaller0 entered promiscuous mode [ 2012.372685][ T2603] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 2012.897902][ T2635] device syzkaller0 entered promiscuous mode [ 2012.914438][ T2635] device syzkaller0 left promiscuous mode [ 2013.132193][ T2636] device syzkaller0 entered promiscuous mode [ 2014.496617][ T2718] device syzkaller0 entered promiscuous mode [ 2014.530773][ T2710] device wg2 left promiscuous mode [ 2014.636378][ T2719] device wg2 entered promiscuous mode [ 2014.642537][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 2015.451553][ T2789] geneve0: tun_chr_ioctl cmd 1074025677 [ 2015.487468][ T2789] geneve0: linktype set to 1 [ 2015.780205][ T2802] device syzkaller0 entered promiscuous mode [ 2017.106532][ T2847] bridge0: port 2(bridge_slave_1) entered disabled state [ 2017.114413][ T2847] device bridge0 left promiscuous mode [ 2017.783132][ T2887] device syzkaller0 entered promiscuous mode [ 2019.178928][ T2937] sock: sock_set_timeout: `syz.2.28685' (pid 2937) tries to set negative timeout [ 2019.504471][ T2959] bridge0: port 3(veth0_to_bridge) entered blocking state [ 2019.511852][ T2959] bridge0: port 3(veth0_to_bridge) entered disabled state [ 2019.520955][ T2959] device veth0_to_bridge entered promiscuous mode [ 2019.527989][ T2959] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2019.547735][ T2959] bridge0: port 3(veth0_to_bridge) entered blocking state [ 2019.555213][ T2959] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 2020.046639][ T2984] tap0: tun_chr_ioctl cmd 1074025680 [ 2022.206791][ T3029] device syzkaller0 entered promiscuous mode [ 2024.298863][ T3103] device dummy0 left promiscuous mode [ 2024.579086][ T3058] device syz_tun left promiscuous mode [ 2024.584755][ T3058] : port 1(syz_tun) entered disabled state [ 2024.754738][ T3110] bridge0: port 1(bridge_slave_0) entered blocking state [ 2024.789551][ T3110] bridge0: port 1(bridge_slave_0) entered disabled state [ 2024.867703][ T3110] device bridge_slave_0 entered promiscuous mode [ 2024.993480][ T3110] bridge0: port 2(bridge_slave_1) entered blocking state [ 2025.121027][ T3110] bridge0: port 2(bridge_slave_1) entered disabled state [ 2025.157544][ T3110] device bridge_slave_1 entered promiscuous mode [ 2025.588929][ T3132] device wg2 left promiscuous mode [ 2025.640559][ T3132] device wg2 entered promiscuous mode [ 2025.646156][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 2025.656701][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2025.671986][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2025.833131][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2025.857770][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2025.899146][T29226] bridge0: port 1(bridge_slave_0) entered blocking state [ 2025.906353][T29226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2025.967365][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2026.014636][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2026.060914][T29226] bridge0: port 2(bridge_slave_1) entered blocking state [ 2026.068063][T29226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2026.096126][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2026.107846][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2026.154462][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2026.163521][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2026.174135][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2026.182413][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2026.190377][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2026.200417][ T3110] device veth0_vlan entered promiscuous mode [ 2026.238385][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2026.247593][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2026.268736][ T3110] device veth1_macvtap entered promiscuous mode [ 2026.291135][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2026.321287][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2026.370800][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2026.389647][ T3161] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 2026.408645][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2026.421781][T29226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2026.708613][T10248] device macsec0 left promiscuous mode [ 2026.714181][T10248] nr0: port 1(macsec0) entered disabled state [ 2026.796489][T10248] device bridge_slave_1 left promiscuous mode [ 2026.819866][T10248] bridge0: port 2(bridge_slave_1) entered disabled state [ 2026.845506][T10248] device bridge_slave_0 left promiscuous mode [ 2026.859777][T10248] bridge0: port 1(bridge_slave_0) entered disabled state [ 2028.855979][ T3245] device syzkaller0 entered promiscuous mode [ 2028.905686][ T3253] syzkaller0: create flow: hash 2425799047 index 0 [ 2028.967630][ T2754] syzkaller0: tun_net_xmit 48 [ 2029.079658][ T3245] syzkaller0 (unregistered): delete flow: hash 2425799047 index 0 [ 2031.010865][ T3340] syz.3.28792[3340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2031.010935][ T3340] syz.3.28792[3340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2031.446585][ T3376] device syzkaller0 entered promiscuous mode [ 2031.861246][ T3392] device wg2 left promiscuous mode [ 2031.929344][ T3394] device wg2 entered promiscuous mode [ 2031.941942][ T3402] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 2031.947740][ T3402] pim6reg0: linktype set to 768 [ 2033.556407][ T3503] device syzkaller0 entered promiscuous mode [ 2034.159892][ T3529] tun0: tun_chr_ioctl cmd 1074025677 [ 2034.169856][ T3529] tun0: linktype set to 820 [ 2035.052323][ T3579] gretap0: mtu less than device minimum [ 2035.287245][ T3593] bridge0: port 4(gretap0) entered blocking state [ 2035.347300][ T3593] bridge0: port 4(gretap0) entered disabled state [ 2035.354199][ T3593] device gretap0 entered promiscuous mode [ 2035.360455][ T3593] bridge0: port 4(gretap0) entered blocking state [ 2035.366876][ T3593] bridge0: port 4(gretap0) entered forwarding state [ 2035.792227][ T3615] @ÿ: renamed from bond_slave_0 [ 2035.901440][ T3615] 6±ÿ: renamed from team_slave_1 [ 2036.408730][ T3633] device syzkaller0 entered promiscuous mode [ 2036.949134][ T3655] device syzkaller0 entered promiscuous mode [ 2038.402591][ T3724] bridge0: port 2(bridge_slave_1) entered disabled state [ 2038.410030][ T3724] bridge0: port 1(bridge_slave_0) entered disabled state [ 2038.497255][ T3720] device bridge_slave_1 left promiscuous mode [ 2038.540340][ T3720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2038.602176][ T3720] device bridge_slave_0 left promiscuous mode [ 2038.619493][ T3720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2040.028677][ T3782] device syzkaller0 entered promiscuous mode [ 2040.564161][ T3820] : port 1(ip6gretap0) entered blocking state [ 2040.570740][ T3820] : port 1(ip6gretap0) entered disabled state [ 2040.579499][ T3820] device ip6gretap0 entered promiscuous mode [ 2040.782726][ T3821] device ip6gretap0 left promiscuous mode [ 2040.797264][ T3821] : port 1(ip6gretap0) entered disabled state [ 2041.615924][ T3871] device syzkaller0 entered promiscuous mode [ 2043.659989][ T3961] batadv0: tun_chr_ioctl cmd 2148553947 [ 2043.838358][ T3989] device syzkaller0 entered promiscuous mode [ 2043.980290][ T4007] bridge0: port 2(bridge_slave_1) entered disabled state [ 2043.987514][ T4007] bridge0: port 1(bridge_slave_0) entered disabled state [ 2046.781242][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2046.794491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2046.808641][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2046.822213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2046.835382][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2046.848540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2046.861312][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2046.874899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2046.888231][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2046.901334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2050.473949][ T4214] : port 2(ip6gretap0) entered blocking state [ 2050.518954][ T4214] : port 2(ip6gretap0) entered disabled state [ 2050.688108][ T4214] device ip6gretap0 entered promiscuous mode [ 2051.097296][ T4213] device ip6gretap0 left promiscuous mode [ 2051.173177][ T4213] : port 2(ip6gretap0) entered disabled state [ 2051.787157][ C1] net_ratelimit: 92065 callbacks suppressed [ 2051.787175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2051.805306][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2051.817343][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2051.829462][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2051.841795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2051.853965][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2051.866134][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2051.878329][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2051.890485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2051.902705][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2053.406655][ T4281] : port 1(ip6gretap0) entered blocking state [ 2053.440758][ T4281] : port 1(ip6gretap0) entered disabled state [ 2053.461984][ T4281] device ip6gretap0 entered promiscuous mode [ 2053.573242][ T4281] device ip6gretap0 left promiscuous mode [ 2053.688170][ T4281] : port 1(ip6gretap0) entered disabled state [ 2053.757667][ T4290] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 2054.071114][ T4301] device wg2 left promiscuous mode [ 2056.797177][ C1] net_ratelimit: 105964 callbacks suppressed [ 2056.797192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2056.815717][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2056.827769][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2056.840180][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2056.852261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2056.864446][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2056.876886][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2056.889201][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2056.901435][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2056.913524][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2058.252788][ T4352] device syzkaller0 entered promiscuous mode [ 2058.703801][ T4362] device syzkaller0 entered promiscuous mode [ 2059.517536][ T4424] device syzkaller0 entered promiscuous mode [ 2059.907093][ T4442] device syzkaller0 entered promiscuous mode [ 2061.807156][ C1] net_ratelimit: 109031 callbacks suppressed [ 2061.807169][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2061.825197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2061.837452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2061.849627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2061.861837][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2061.874413][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2061.886534][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2061.898903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2061.911116][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2061.923176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2063.315374][ T4478] device syzkaller0 entered promiscuous mode [ 2063.685592][ T4495] device syzkaller0 entered promiscuous mode [ 2063.718354][T18274] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 2066.461416][ T4597] device syzkaller0 entered promiscuous mode [ 2066.749129][ T4616] device syzkaller0 entered promiscuous mode [ 2066.817149][ C1] net_ratelimit: 102805 callbacks suppressed [ 2066.817163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2066.835298][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2066.847528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2066.859720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2066.871743][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2066.884101][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2066.896311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2066.908475][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2066.920763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2066.932900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2069.779213][ T4765] device syzkaller0 entered promiscuous mode [ 2070.548887][ T4776] device syzkaller0 entered promiscuous mode [ 2071.376188][ T4801] device syzkaller0 entered promiscuous mode [ 2071.827134][ C1] net_ratelimit: 91800 callbacks suppressed [ 2071.827148][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2071.845145][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2071.857299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2071.869411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2071.881930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2071.894124][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2071.906376][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2071.918685][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2071.930940][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2071.943130][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2073.406684][ T4875] tap0: tun_chr_ioctl cmd 1074025692 [ 2074.773041][ T4937] device syzkaller0 entered promiscuous mode [ 2074.998205][ T4954] device pim6reg1 entered promiscuous mode [ 2076.271990][ T5007] device syzkaller0 entered promiscuous mode [ 2076.839001][ C1] net_ratelimit: 54633 callbacks suppressed [ 2076.839085][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2076.858286][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2076.871808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2076.885614][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2076.898638][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2076.911554][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2076.924866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2076.937724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2076.950197][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2076.963194][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2077.720688][ T5062] 6±ÿ: renamed from team_slave_1 [ 2078.186905][ T5084] device syzkaller0 entered promiscuous mode [ 2078.769557][ T5118] device wg2 left promiscuous mode [ 2079.022285][ T5129] device wg2 entered promiscuous mode [ 2079.169354][ T5129] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 2079.210339][ T5134] syz.2.29294[5134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2079.210400][ T5134] syz.2.29294[5134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2081.749882][ T5192] : port 1(ip6gretap0) entered blocking state [ 2081.834852][ T5192] : port 1(ip6gretap0) entered disabled state [ 2081.848250][ C1] net_ratelimit: 58684 callbacks suppressed [ 2081.848277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2081.855021][ T5192] device ip6gretap0 entered promiscuous mode [ 2081.870081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2081.887053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2081.905392][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2081.912605][ T5190] device ip6gretap0 left promiscuous mode [ 2081.926624][ T5190] : port 1(ip6gretap0) entered disabled state [ 2081.931671][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2081.947891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2081.962484][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2081.981773][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2082.001714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2082.016072][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2086.857140][ C1] net_ratelimit: 59296 callbacks suppressed [ 2086.857154][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2086.875315][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2086.887536][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2086.899752][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2086.911940][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2086.924211][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2086.936548][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2086.948688][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2086.960799][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2086.972836][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2088.789077][ T5405] device wg2 left promiscuous mode [ 2089.848324][ T5442] bridge0: port 2(bridge_slave_1) entered blocking state [ 2089.855517][ T5442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2089.862842][ T5442] bridge0: port 1(bridge_slave_0) entered blocking state [ 2089.869889][ T5442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2090.039133][ T5442] device bridge0 entered promiscuous mode [ 2090.457218][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2091.867657][ C1] net_ratelimit: 55267 callbacks suppressed [ 2091.867684][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2091.889855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2091.904088][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2091.917589][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2091.931812][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2091.948022][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2091.961903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2091.975751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2091.991521][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2092.008119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2092.675272][ T5536] device syzkaller0 entered promiscuous mode [ 2093.516089][ T5586] device syzkaller0 entered promiscuous mode [ 2094.780259][ T5631] device syzkaller0 entered promiscuous mode [ 2096.877161][ C1] net_ratelimit: 56115 callbacks suppressed [ 2096.877173][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2096.895323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2096.907930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2096.919967][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2096.932570][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2096.944927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2096.957048][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2096.969464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2096.981628][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2096.993786][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2097.046769][T26047] device syz_tun left promiscuous mode [ 2097.057610][T26047] : port 1(syz_tun) entered disabled state [ 2097.410444][ T5686] bridge0: port 1(bridge_slave_0) entered blocking state [ 2097.421041][ T5686] bridge0: port 1(bridge_slave_0) entered disabled state [ 2097.430935][ T5686] device bridge_slave_0 entered promiscuous mode [ 2097.487701][ T5686] bridge0: port 2(bridge_slave_1) entered blocking state [ 2097.513048][ T5686] bridge0: port 2(bridge_slave_1) entered disabled state [ 2097.534133][ T5686] device bridge_slave_1 entered promiscuous mode [ 2098.041769][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2098.111250][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2098.228111][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2098.237961][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2098.261764][T10248] bridge0: port 1(bridge_slave_0) entered blocking state [ 2098.268935][T10248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2098.292764][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2098.311010][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2098.329575][T10248] bridge0: port 2(bridge_slave_1) entered blocking state [ 2098.336617][T10248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2098.426710][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2098.522485][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2098.591630][T10248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2098.703308][ T5764] device wg2 left promiscuous mode [ 2098.772692][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2098.801481][ T5686] device veth0_vlan entered promiscuous mode [ 2098.808275][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2098.816638][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2098.927173][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2098.946662][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2098.973423][ T5686] device veth1_macvtap entered promiscuous mode [ 2098.986889][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2099.021090][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2099.039192][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2099.079146][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2099.094885][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2099.109069][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2099.117982][ T1938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2101.841051][ T5363] device veth1_macvtap left promiscuous mode [ 2101.887132][ C1] net_ratelimit: 63279 callbacks suppressed [ 2101.887146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2101.905549][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2101.917598][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2101.929984][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2101.942114][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2101.954239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2101.966298][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2101.978623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2101.990807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2102.003293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2102.574363][ T5900] tun0: tun_chr_ioctl cmd 1074025676 [ 2102.604956][ T5900] tun0: owner set to 0 [ 2106.897240][ C1] net_ratelimit: 47866 callbacks suppressed [ 2106.897254][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2106.915298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2106.927438][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2106.939654][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2106.952079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2106.964215][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2106.976402][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2106.988460][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2107.000701][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2107.012952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2111.907130][ C1] net_ratelimit: 29375 callbacks suppressed [ 2111.907142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2111.925415][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2111.937565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2111.949989][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2111.962251][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2111.974417][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2111.986877][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2111.999127][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2112.011869][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2112.024004][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2113.333339][ T6169] device syzkaller0 entered promiscuous mode [ 2116.917136][ C1] net_ratelimit: 60781 callbacks suppressed [ 2116.917150][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2116.935478][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2116.947708][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2116.959892][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2116.972079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2116.984256][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2116.996486][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2117.008557][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2117.021024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2117.033239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2121.173376][ T6374] bridge0: port 3(veth0_to_bridge) entered disabled state [ 2121.180762][ T6374] bridge0: port 2(bridge_slave_1) entered disabled state [ 2121.188014][ T6374] bridge0: port 1(bridge_slave_0) entered disabled state [ 2121.244427][ T6376] bridge0: port 3(veth0_to_bridge) entered blocking state [ 2121.251663][ T6376] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 2121.259153][ T6376] bridge0: port 2(bridge_slave_1) entered blocking state [ 2121.266189][ T6376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2121.273510][ T6376] bridge0: port 1(bridge_slave_0) entered blocking state [ 2121.280579][ T6376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2121.327198][ T6376] device bridge0 entered promiscuous mode [ 2121.927155][ C0] net_ratelimit: 75896 callbacks suppressed [ 2121.927168][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2121.927200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2121.933299][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2121.945337][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2121.957412][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2121.969443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2121.981456][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2121.993406][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2122.005261][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2122.017291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2126.937145][ C1] net_ratelimit: 227994 callbacks suppressed [ 2126.937159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2126.937178][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2126.943326][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2126.955436][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2126.967321][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2126.979198][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2126.991065][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2127.002978][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2127.015166][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2127.027237][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2131.947136][ C1] net_ratelimit: 219331 callbacks suppressed [ 2131.947148][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2131.947156][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2131.947222][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2131.953208][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2131.965241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2131.977311][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2131.989745][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2132.001796][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2132.013888][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2132.026321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2136.957144][ C0] net_ratelimit: 223036 callbacks suppressed [ 2136.957158][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2136.957201][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2136.963230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2136.975344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2136.987342][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2136.999479][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2137.011349][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2137.023707][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2137.035510][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2137.047587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2141.967186][ C0] net_ratelimit: 225658 callbacks suppressed [ 2141.967199][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2141.967222][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2141.973411][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2141.985580][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2141.997681][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2142.009576][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2142.021764][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2142.033774][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2142.045838][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2142.057759][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2146.977182][ C1] net_ratelimit: 224193 callbacks suppressed [ 2146.977195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2146.977229][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2146.983266][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2146.995349][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2147.007696][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2147.019811][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2147.031760][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2147.043902][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2147.056085][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2147.068232][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2151.987138][ C0] net_ratelimit: 222660 callbacks suppressed [ 2151.987151][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2151.987159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2151.987203][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2151.993212][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2152.005226][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2152.017340][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2152.029304][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2152.041251][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2152.053282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2152.065435][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2156.997139][ C1] net_ratelimit: 214966 callbacks suppressed [ 2156.997153][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2156.997192][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2157.003245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2157.015133][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2157.027193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2157.039515][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2157.051581][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2157.063572][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2157.075619][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2157.087765][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2162.007178][ C0] net_ratelimit: 206037 callbacks suppressed [ 2162.007193][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2162.017202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2162.025535][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2162.037419][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2162.049650][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2162.061651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2162.073596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2162.085751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2162.097895][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2162.109868][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2167.017178][ C0] net_ratelimit: 204342 callbacks suppressed [ 2167.017189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2167.017208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2167.023327][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2167.035398][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2167.047462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2167.059496][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2167.071526][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2167.083479][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2167.095382][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2167.107455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2172.027159][ C0] net_ratelimit: 207685 callbacks suppressed [ 2172.027243][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2172.027252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2172.027321][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2172.033561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2172.045429][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2172.057315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2172.069545][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2172.081405][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2172.093303][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2172.105178][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2174.091203][ T6400] device syzkaller0 entered promiscuous mode [ 2177.037176][ C0] net_ratelimit: 202559 callbacks suppressed [ 2177.037190][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2177.037208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2177.043307][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2177.055452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2177.067418][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2177.079265][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2177.091433][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2177.103485][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2177.115252][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2177.127295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2182.047175][ C1] net_ratelimit: 201640 callbacks suppressed [ 2182.047189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2182.047233][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2182.053232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2182.065713][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2182.078077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2182.089971][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2182.101811][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2182.113762][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2182.125706][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2182.137680][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2187.057168][ C0] net_ratelimit: 213680 callbacks suppressed [ 2187.057183][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2187.057212][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2187.063254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2187.075344][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2187.087319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2187.099221][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2187.111119][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2187.123198][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2187.135015][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2187.146875][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2192.067147][ C1] net_ratelimit: 212748 callbacks suppressed [ 2192.067161][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2192.067181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2192.073372][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2192.085288][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2192.097226][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2192.109315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2192.121361][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2192.133369][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2192.145525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2192.157414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2197.077148][ C1] net_ratelimit: 211259 callbacks suppressed [ 2197.077162][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2197.077269][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2197.083290][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2197.095503][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2197.107733][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2197.119760][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2197.131712][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2197.143548][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2197.155813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2197.167826][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2202.087145][ C0] net_ratelimit: 204468 callbacks suppressed [ 2202.087158][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2202.087199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2202.093200][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2202.105174][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2202.117297][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2202.129264][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2202.141319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2202.153100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2202.165012][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2202.177273][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2207.097149][ C1] net_ratelimit: 205030 callbacks suppressed [ 2207.097163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2207.097171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2207.097226][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2207.103263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2207.115241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2207.127079][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2207.139154][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2207.151277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2207.163270][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2207.175252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2212.107146][ C1] net_ratelimit: 207396 callbacks suppressed [ 2212.107159][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2212.107194][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2212.113528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2212.125380][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2212.137466][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2212.149469][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2212.161931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2212.173963][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2212.186041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2212.197936][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2217.117164][ C0] net_ratelimit: 203073 callbacks suppressed [ 2217.117178][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2217.117197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2217.123229][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2217.135231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2217.147175][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2217.159175][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2217.171172][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2217.183784][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2217.195737][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2217.207646][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2222.127151][ C0] net_ratelimit: 180401 callbacks suppressed [ 2222.127164][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2222.127323][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2222.133312][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2222.145307][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2222.157438][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2222.169323][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2222.181274][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2222.193241][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2222.205099][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2222.217190][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2227.137169][ C1] net_ratelimit: 180232 callbacks suppressed [ 2227.137182][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2227.137207][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2227.143393][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2227.155235][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2227.167365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2227.179304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2227.191486][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2227.203440][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2227.215537][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2227.227361][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2232.147163][ C0] net_ratelimit: 174886 callbacks suppressed [ 2232.147175][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2232.147183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2232.147251][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2232.153252][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2232.165437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2232.177376][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2232.189601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2232.201511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2232.213564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2232.225387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2237.157140][ C0] net_ratelimit: 175087 callbacks suppressed [ 2237.157153][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2237.157302][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2237.163234][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2237.175231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2237.187141][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2237.199025][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2237.211008][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2237.223117][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2237.234897][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2237.246807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2242.167153][ C0] net_ratelimit: 184006 callbacks suppressed [ 2242.167167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2242.167185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2242.173300][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2242.185281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2242.197944][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2242.210108][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2242.222039][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2242.234003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2242.245911][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2242.257896][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2247.177172][ C0] net_ratelimit: 183228 callbacks suppressed [ 2247.177185][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2247.177245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2247.183224][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2247.195550][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2247.207391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2247.219238][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2247.231514][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2247.243601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2247.255568][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2247.267509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2252.187173][ C0] net_ratelimit: 183959 callbacks suppressed [ 2252.187187][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2252.187217][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2252.193510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2252.205741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2252.217628][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2252.230025][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2252.241823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2252.253855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2252.265691][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2252.277627][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2257.197143][ C0] net_ratelimit: 184248 callbacks suppressed [ 2257.197157][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2257.197199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2257.203310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2257.215418][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2257.227396][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2257.239357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2257.251402][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2257.263626][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2257.275357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2257.287208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2262.207163][ C0] net_ratelimit: 180110 callbacks suppressed [ 2262.207177][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2262.207240][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2262.213225][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2262.225358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2262.237182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2262.248995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2262.261189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2262.273434][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2262.285340][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2262.297353][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2267.217145][ C0] net_ratelimit: 181688 callbacks suppressed [ 2267.217159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2267.217270][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2267.223233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2267.235519][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2267.247345][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2267.259168][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2267.271326][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2267.283316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2267.295383][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2267.307282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2272.227178][ C0] net_ratelimit: 181702 callbacks suppressed [ 2272.227192][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2272.227210][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2272.233358][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2272.245350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2272.257383][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2272.269308][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2272.281274][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2272.293472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2272.305204][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2272.317254][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2277.237146][ C1] net_ratelimit: 186743 callbacks suppressed [ 2277.237159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2277.237167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2277.237220][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2277.243219][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2277.255206][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2277.267248][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2277.279156][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2277.291053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2277.302884][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2277.314836][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2282.247166][ C1] net_ratelimit: 185232 callbacks suppressed [ 2282.247181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2282.247199][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2282.253281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2282.265358][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2282.277196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2282.289183][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2282.301182][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2282.313013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2282.325074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2282.337031][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2287.257139][ C0] net_ratelimit: 183089 callbacks suppressed [ 2287.257152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2287.257171][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2287.263218][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2287.275233][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2287.287211][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2287.299232][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2287.311080][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2287.323045][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2287.335021][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2287.346975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2292.267140][ C1] net_ratelimit: 176432 callbacks suppressed [ 2292.267154][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2292.267162][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2292.267215][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2292.273227][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2292.285282][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2292.297193][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2292.309220][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2292.321231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2292.333117][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2292.345250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2297.277145][ C1] net_ratelimit: 179150 callbacks suppressed [ 2297.277159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2297.277187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2297.283215][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2297.295210][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2297.307372][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2297.319231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2297.331177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2297.343145][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2297.355100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2297.367083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2302.287140][ C0] net_ratelimit: 180135 callbacks suppressed [ 2302.287153][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2302.287161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2302.287198][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2302.293236][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2302.305305][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2302.317130][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2302.329075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2302.341016][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2302.353066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2302.364998][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2307.297139][ C0] net_ratelimit: 186862 callbacks suppressed [ 2307.297152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2307.297184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2307.303289][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2307.315254][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2307.327175][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2307.339352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2307.351085][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2307.362955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2307.374830][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2307.386774][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2312.307158][ C0] net_ratelimit: 182655 callbacks suppressed [ 2312.307172][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2312.307232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2312.313203][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2312.325293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2312.337414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2312.349232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2312.361205][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2312.373496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2312.385445][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2312.397387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2317.317173][ C0] net_ratelimit: 180764 callbacks suppressed [ 2317.317187][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2317.317280][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2317.323211][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2317.335263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2317.347089][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2317.359244][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2317.371284][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2317.383531][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2317.395525][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2317.407696][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2322.327135][ C0] net_ratelimit: 178888 callbacks suppressed [ 2322.327149][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2322.327177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2322.333271][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2322.345377][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2322.357723][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2322.369707][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2322.381514][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2322.393526][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2322.405401][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2322.417561][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2327.337145][ C0] net_ratelimit: 176954 callbacks suppressed [ 2327.337159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2327.337230][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2327.343245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2327.355135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2327.367091][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2327.379032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2327.391048][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2327.403195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2327.415215][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2327.427286][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2332.347159][ C1] net_ratelimit: 182219 callbacks suppressed [ 2332.347174][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2332.347195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2332.353217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2332.365242][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2332.377331][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2332.389209][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2332.401301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2332.413180][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2332.425224][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2332.437206][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2337.357145][ C0] net_ratelimit: 188020 callbacks suppressed [ 2337.357158][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2337.357191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2337.363201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2337.375398][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2337.387426][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2337.399311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2337.411353][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2337.423317][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2337.435424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2337.447394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2342.367169][ C0] net_ratelimit: 182902 callbacks suppressed [ 2342.367183][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2342.367208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2342.373255][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2342.385555][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2342.397944][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2342.410526][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2342.422067][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2342.434039][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2342.445967][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2342.457890][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2347.377147][ C1] net_ratelimit: 180338 callbacks suppressed [ 2347.377161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2347.377169][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2347.377203][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2347.383221][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2347.395453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2347.407644][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2347.419500][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2347.431507][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2347.443716][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2347.455613][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2352.387137][ C0] net_ratelimit: 180193 callbacks suppressed [ 2352.387152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2352.387171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2352.393225][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2352.405184][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2352.417357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2352.429358][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2352.441236][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2352.453318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2352.465187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2352.477231][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2357.397141][ C1] net_ratelimit: 179649 callbacks suppressed [ 2357.397155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2357.397163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2357.397223][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2357.403343][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2357.415620][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2357.427923][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2357.439790][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2357.451741][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2357.463667][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2357.475581][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2362.407140][ C0] net_ratelimit: 185560 callbacks suppressed [ 2362.407154][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2362.407271][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2362.413197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2362.425332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2362.437291][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2362.449207][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2362.461201][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2362.473156][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2362.485009][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2362.497121][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2367.417137][ C0] net_ratelimit: 185453 callbacks suppressed [ 2367.417151][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2367.417175][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2367.423250][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2367.435273][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2367.447093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2367.459149][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2367.471040][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2367.482881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2367.494879][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2367.506873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2372.427160][ C0] net_ratelimit: 182344 callbacks suppressed [ 2372.427171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2372.427179][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2372.427233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2372.433369][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2372.445364][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2372.457440][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2372.469411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2372.481280][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2372.493295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2372.505429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2377.437156][ C0] net_ratelimit: 180056 callbacks suppressed [ 2377.437169][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2377.437207][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2377.443225][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2377.455434][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2377.467274][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2377.479129][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2377.491149][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2377.503105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2377.515077][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2377.527086][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2382.447151][ C0] net_ratelimit: 180206 callbacks suppressed [ 2382.447164][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2382.447172][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2382.447221][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2382.453242][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2382.465249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2382.477195][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2382.489538][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2382.501529][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2382.513404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2382.525358][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2387.457164][ C0] net_ratelimit: 182807 callbacks suppressed [ 2387.457178][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2387.457187][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2387.457220][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2387.463304][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2387.475362][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2387.487342][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2387.499284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2387.511301][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2387.523234][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2387.535179][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2392.467174][ C0] net_ratelimit: 178829 callbacks suppressed [ 2392.467188][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2392.467241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2392.473284][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2392.485162][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2392.497066][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2392.509185][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2392.521254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2392.533265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2392.545100][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2392.557131][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2397.477167][ C0] net_ratelimit: 178681 callbacks suppressed [ 2397.477182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2397.477223][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2397.483286][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2397.495381][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2397.507203][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2397.519374][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2397.531377][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2397.543484][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2397.555370][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2397.567207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2402.487163][ C0] net_ratelimit: 189939 callbacks suppressed [ 2402.487177][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2402.487234][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2402.493296][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2402.505334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2402.517204][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2402.529157][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2402.541728][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2402.553799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2402.565741][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2402.577632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2407.497144][ C0] net_ratelimit: 189203 callbacks suppressed [ 2407.497158][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2407.497167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2407.497220][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2407.503235][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2407.515352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2407.527336][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2407.539407][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2407.551283][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2407.563189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2407.575206][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2412.507197][ C0] net_ratelimit: 186256 callbacks suppressed [ 2412.507209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2412.507217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2412.507272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2412.513256][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2412.525257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2412.537181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2412.549250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2412.561129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2412.573020][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2412.585023][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2417.517148][ C0] net_ratelimit: 183541 callbacks suppressed [ 2417.517161][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2417.517180][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2417.523213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2417.535120][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2417.547350][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2417.559203][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2417.571242][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2417.583458][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2417.595345][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2417.607512][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2422.527142][ C1] net_ratelimit: 186125 callbacks suppressed [ 2422.527156][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2422.527189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2422.533257][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2422.545139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2422.557382][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2422.569473][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2422.581216][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2422.593183][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2422.605181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2422.616999][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2427.537157][ C1] net_ratelimit: 185097 callbacks suppressed [ 2427.537170][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2427.537189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2427.543244][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2427.555871][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2427.568012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2427.579873][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2427.591988][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2427.603773][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2427.615866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:e2:00:a1:00:6e:a3, vlan:0) [ 2427.627836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)