last executing test programs: 1m43.173080615s ago: executing program 0 (id=6071): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0x7ff, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0800000004000000060000008808000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) (async) getpid() (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000f0ffffff0000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000140)={0x4, 0x80, 0x7, 0x4, 0x1, 0x2, 0x0, 0xda5, 0x10684, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xf, 0x4, @perf_config_ext={0x4a5, 0x15}, 0x10d982, 0x5, 0x7, 0x3, 0x10001, 0x100, 0x2, 0x0, 0x0, 0x0, 0x5}, r1, 0x1, r0, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0xa) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x5) 1m43.038747061s ago: executing program 0 (id=6072): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcf, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xae31cbdd19173c73, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000004000000060000008000000042000000", @ANYRES32, @ANYBLOB="0000000000000010000056f8ffffff00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xcb13119f635c50e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r4}, 0xc) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)="e2c5cf426f", &(0x7f0000000080), 0x619, r2}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 1m42.649359169s ago: executing program 4 (id=6078): ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="2164a25e540b", @local, @remote]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x44100, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@random="1a961ad07ffb", @local, @random="53415e9283df", @empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @remote]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)={0x4}, 0x8) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000100)={'batadv_slave_0\x00'}) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000180)={'veth0', 0x32, 0x39}, 0x8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)='%ps \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r2, &(0x7f0000000280)="ac7ff1541b4a6e6b9e7f67f81d2eb0b6b56631", &(0x7f00000002c0)=""/138}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f00000004c0)=0x1) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x404080, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000540)={'ip_vti0\x00', 0x10}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000006c0)={&(0x7f0000000580)="0711a1dd98d30edfd3c7610d689a1a94b392814f2836b076caeff7d5bc1b15f428e98937ae7941151007", &(0x7f00000005c0)=""/17, &(0x7f0000000600)="2a5b9b6c16e9d44e4633fa70bbd04ffd2281fb52d51d1628d91f5291e094e4f2e27bceca90169f01b4d04f4b96e4b045520798b494f94f51", &(0x7f0000000640), 0xffff43ad, r5}, 0x38) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000700)={'ip6gre0\x00', 0x1000}) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000740)) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x10) r6 = openat$cgroup_ro(r5, &(0x7f0000000780)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000007c0)={'geneve1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000940)={0x1, &(0x7f0000000800)="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", &(0x7f0000000900)=""/55}, 0x20) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000980)) ioctl$TUNSETLINK(r4, 0x400454cd, 0x324) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@fallback=r6, 0xa, 0x1, 0x5, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000a00)=[0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a80)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map=r3, r5, 0x36, 0xc, 0x0, @void, @value=r6, @void, @void, r8}, 0x20) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000b40)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000b80)=')]:(\xcf)$h]-]\x8a)\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e80)={r7, 0xe0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000bc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000c00)=[0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0], 0x0, 0x26, &(0x7f0000000c80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xc0, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000ec0)=r9) 1m42.578186563s ago: executing program 2 (id=6079): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) r2 = getpid() r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=r3, 0x24, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r2, r3, 0x0, 0x7, &(0x7f0000000000)='cgroup\x10'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x4001000, 0x0, 0x408, &(0x7f0000000140), 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff0000000000040000851000000200000085000000230000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x123140, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x45}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f00000000c0)}, 0x10) 1m42.342510693s ago: executing program 4 (id=6082): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000080000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000070000008500000010"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0xa}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce2200fc00000000000000000000000000007f"], 0xfdef) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r3}, &(0x7f00000000c0), &(0x7f0000000100)=r1}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 1m42.101377234s ago: executing program 2 (id=6084): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1, 0x18}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x6, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000300)=r5) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x6, 0xfd}, {0x74, 0x0, 0x0, 0x1}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a80)=@generic={&(0x7f0000001c80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m42.100768194s ago: executing program 0 (id=6085): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xd7}, 0x0, 0x10000000000, 0xffffffffffffffff, 0x0) socketpair(0x22, 0x800, 0xffffffff, &(0x7f00000004c0)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="000000002400000024000000000000000903000000000000000000000d00000000000000000000000a020000000000"], &(0x7f0000000100)=""/223, 0x3e, 0xdf, 0x1}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="020000000400000008010000010000008000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="000000000100"/28], 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1000000004000000080000000300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="faffffff000000000000000000000000000000000000000000000000fe6d69192cf808c5cf8e36a4a6add56cea52358c3a8f962e35d6cbab2da47b8aafe8655024bcfa18cb0d08c12ab40e033262a5dfb68b52d4730344600fada40131a5b4ef7992a11e9b1863326a71b2d2edb9922cc79d5a4dd2a0663476cd4965da40b4799b1822969723eeeb91e8033c9d3208fddc7676c4dffff5bb264e532b2204e546"], 0x48) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000040000008a0800000c"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000002780)=@base={0x1, 0x3, 0x8, 0x8, 0x40, 0xffffffffffffffff, 0x74ebdffb}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000b60100007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000013da0000850000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r6, r5}, 0xc) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) 1m41.443564674s ago: executing program 4 (id=6089): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000071e96995c1cb61dbf9000000000000aee95c515fdc289b0de67b1a1c3ea75cf72668b1ed0012b6080d87b4c1041d63e2b6df68ef3675140d6703d42f09b29c77"], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000050000000100000007"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r2, 0x58, &(0x7f0000000140)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r3, &(0x7f00000002c0), 0x0}, 0x20) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x1c, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x10}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000071e96995c1cb61dbf9000000000000aee95c515fdc289b0de67b1a1c3ea75cf72668b1ed0012b6080d87b4c1041d63e2b6df68ef3675140d6703d42f09b29c77"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000050000000100000007"], 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r2, 0x58, &(0x7f0000000140)}, 0x10) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r3, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x1c, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x10}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) 1m41.040011962s ago: executing program 4 (id=6090): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x6, 0x0, 0xd}, @exit={0x95, 0x0, 0x7b00}, @call={0x85, 0x0, 0x0, 0x18}]}, &(0x7f00000003c0)='syzkaller\x00', 0x4, 0x92, &(0x7f0000000240)=""/146}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @call={0x85, 0x0, 0x0, 0x5b}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) perf_event_open(&(0x7f0000000500)={0x3, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) 1m40.568123813s ago: executing program 2 (id=6093): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000002000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000001000000850000002d000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r0}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f0000000500)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r3) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r7, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb6012887636086466670881ffe80000000000000", @ANYRESDEC], 0xffdd) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x101808, 0x4, 0x3, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="b400000000000000611484000000000005000000000000009500000000000000dcf6f0523c44fa1fe5a2414094e93bde1ac8f87507f0595104ffa7961c0c25934da395e1975f7c4e7ab1f92cb1e93f33b23bcf4ffd10c2023fcadf2605fc311c1c20b80d4958a4a57cbacc0d7ab9893168a3448440fa0378ebf6d0f4a52207dda3fe06e2063376937c4d7f3c50e225e6"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001380)=ANY=[@ANYBLOB="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", @ANYRES16=r8], &(0x7f0000000340)='syzkaller\x00'}, 0x94) 1m40.567121364s ago: executing program 0 (id=6094): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES16, @ANYBLOB="000000f34279e645765f5f"], 0x48) (async) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) 1m40.43510977s ago: executing program 1 (id=6095): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000000)='./file0\x00', r1}, 0x18) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8929, &(0x7f0000001f40)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) (rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="020000000400000000000100000000009a000080ed0df93cd41e73d637828b41af7161", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="02000000000000000500"/28], 0x50) (async, rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, r2, 0x0, 0xb, &(0x7f00000003c0)='veth0_vlan\x00', 0x0}, 0x30) (rerun: 64) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r7}, 0x4) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="181100005f41ffbdb88d102adfe8a7aa5ca03cfc5581c0c102308db864b71b4be76719eebd2441cddb8d7fa923de87e13b0c4d78845f18c8f16fc06e00f9a3e076184fe9f84319acc7bb1ef0823799dec5170454118148221294a4be1fb92e450757199d64344346d54538ecd4bac4f01fa2cb7ff93b10e7de55f8868fb45e196fb638d813e8c3cf8fcf51c66ef05b2f4516d86a7892e13d95abeebff4cdc5a7732f2ffa4f01896d851f16b4673bb04b8a2b5e1f4d57862f3d", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f0000000100)='syzkaller\x00', 0x5, 0xfa, &(0x7f0000000240)=""/250, 0x41000, 0x40, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x3, 0x15, 0xc1}, 0x10, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000001c0)=[r3, 0xffffffffffffffff, r3, r3], &(0x7f0000000340)=[{0x4, 0x2, 0x10, 0x3}, {0x3, 0x1, 0x0, 0x3309b1985e1bde41}, {0x1, 0x1, 0xd, 0x3}, {0x2, 0x1, 0x2, 0x9}]}, 0x94) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (rerun: 32) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) (async) write$cgroup_subtree(r9, &(0x7f00000000c0)=ANY=[@ANYBLOB="934aa058f456750d6cbd32b8235f2159edaae59f6242dc"], 0x5) 1m40.329480974s ago: executing program 0 (id=6096): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd67f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000007d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth0_vlan\x00', @random="0100002010ff"}) 1m39.952730691s ago: executing program 1 (id=6097): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000001900000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000010000000000000000000000950000000000000046682d562c31aa909594c57a164463536e83a7f6ac12a8b52f0d70aa97a91fa46cdcefe7534fda04cace652409e818c0b1da96d9c9fa8e9523840100cbac3c07c3db6bc11fa42d9ca632c33ca9a00987000000002cd50db1486b80ee61ff6ddaa4bf0609a8ef7fd07f4c556489cf61cf8e63e826fff67d3299ca9f9b85cdcd75b85bb1775f4ff03b75aa7b6aa1a7e9a2b91d103d541bce370d9e6810dec2fe8300dc5edf3f6aa43810579aedb7e19fbacb5bd5e5337b507559ca6acc6471ecad2746ab01526ace07000000c1ea01c13a2406007d0efb7e91a9dbde2353f035347270d076c93f1b1a810cb2c7d72ee9ce76e6da15600893bc36f6502f000000000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}, 0x112048}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000007000000000000feffffff711206000000000095"], 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1m39.419566476s ago: executing program 2 (id=6099): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000c00000004000000010000840203000000000000030000000000000000000000000000010500000020000000000000000000000b02000000006100302e"], 0x0, 0x58}, 0x28) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r0, 0x2, 0x3}, 0x50) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xdf}, 0x10020) (async) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r3}, 0x94) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x559, '\x00', 0x0, r3, 0x5}, 0x50) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) setsockopt$sock_attach_bpf(r5, 0x1, 0x2f, &(0x7f0000000400), 0xa5e) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, r3, 0x1, 0x3, 0x2}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000001000000000000010000000000000000000000000000000105000000100000000000000000000003000000000100000002"], 0x0, 0x53}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000a00000002000000000000010200416c806c00010800000001000084090000000400000001000000010000000061615f5f0000305f"], &(0x7f0000000000)=""/138, 0x4a, 0x8a, 0x1}, 0x28) 1m39.418048706s ago: executing program 2 (id=6100): socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000700)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000002f00000000000000181000002c32b136dcc146ef7b4a4a817e823c786e0bee444d8628231ab77e498502e5af38f19c72d9aa980b534f4aa3a6de7b75e298db852545a6dc4cfa66d903b79db5628486479c0ab3d2a7a5b90a482b64c833c84af01b", @ANYRES32=r0, @ANYBLOB="00000000000000009500000c000000009500007000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x33}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89e1, &(0x7f00000005c0)={'bridge_slave_1\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="b50a0000000000006111500000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) socketpair(0x10, 0x0, 0x1, &(0x7f0000000540)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a00)={{r0}, &(0x7f0000000980), &(0x7f00000009c0)='%ps \x00'}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@cgroup=r4, 0x24, 0x0, 0xffff, &(0x7f0000000000)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0xfa, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000680), 0x8, 0x72, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0xd, 0x1, 0x0, 0x7, 0x8000, r0, 0x5800000, '\x00', r5, 0xffffffffffffffff, 0x1, 0x4, 0x4, 0x0, @value=r4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x1c, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000001509010000000000b500f8ffffff000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000a36c00850000001700000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) 1m39.299668522s ago: executing program 1 (id=6101): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x2000000, 0x4, 0x0, &(0x7f00000001c0)="5cdd3086", 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x87) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073113d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x90) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000002"], 0x0}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3b) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000002}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x94) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c00000000140000", @ANYRES32, @ANYBLOB="00001c000000000000000d056a0900006e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xff, 0x3d}, 0x0, 0x0, 0x1ff, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) r8 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x1a, 0xa6, &(0x7f0000000180)="32d36f6d86953cd6d41a6051acdedc7056c88aeab0b035dfe4ee", &(0x7f0000000500)=""/166, 0x9913, 0x0, 0xc3, 0x8c, &(0x7f0000000800)="ea0ea2baeb198f35be37e869b0c4a9045f7dd6c1430f2426e2ab6287d22a67485782cc6026b29fb5a23605a20a8d72db0c08dd197210058d400ec8040987852be0974c8dd8cb4a1776af04b86203e791c78e26935822b5a7d3f31080b2945417b4f657dabfec98f988233b5e17026f770f3e391cc76f87b512264ebec033fd2e1f09e58b015cea1a65844669ed39f0e5cb124994e4723ee8bf1d10aca74485629df7f942fb3e2f0d1d7fe1426c513f1ae95f65f4cd5e395e087b41510ae7fba35dd6c5", &(0x7f0000000900)="4ad9586676e1a95a14e7498463d50cd5c41eebf45636ec098dd1f657968d9e19305e2278e7567431f5edd63ebd76ec29972e89f016b8bedf73992705c4f798ccbe76a1f30134098e0a3d0dfd4a108a7d73853b8697825d37436c378ca33257c046479314434e476470150317a55a0281af66e004b4f5a7fbc54a4df7ea0e7c98810500d6832e1c69040a6e59", 0x16bb9ea0d8cb97f9, 0x0, 0x6}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="10001d000000faff947b72fb9900000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x50}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f3, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) 1m38.036232178s ago: executing program 3 (id=6104): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000900)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000004c0)=@file={0x1}, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000540)="fab8cbc53f0236cd26d44bc812d387c3390486b1e5311992172a028978cb0080534d9866c5b6f77f1db500338be3bce2fa1157505b50c3c518ff22b4879eeb0268c56568d9713d41bf21282183b06c8bfb7fb00be0e1e7aa1846be6bf6eba035143424477556ee5162bdbfbfa1ea1c643502134db049b672f6e295f4434505ea5e4c2daf1385cac6c33a4c195bc6eceb11d7ae0057b64432a7cfd966bb40abea37ef89a68763709ec4ae26ff628c41913a39d608d7c9a33089f5ef66ebcd4af2f9046f86eefaa0ccf6c3573218ce8e636c1b851feef1d2686ef1488d56bf109a6e65181b5203acd205ea6f471d62fed47ff29ece", 0xf4}, {&(0x7f0000000400)="cb246a586791dea8c4b906a1018bee6fd0c191ffa7e2227dd5d1383f6b020303a6625c1a0d0d5334b81b2a9dcdd2552de9878cc12d8fcd0595729253e1", 0x3d}, {&(0x7f0000000680)="b6eba6abd3762117b8884f91f7c55569d557a8f733f953b7d333c359d06468097105b12b2a2d045825bd1738a52a5d1b78375ebad3ffb73b974c477b9fa0ae0ba3064d37998c3c68961f9a6bff548039c4552ceec9bf375c19c482508193283c8298d8b4fe3e5b4d2c8b9c1ddf69fcafa8f24ffeedbfda8f192cfcb969dd1617a994897e91b432f272ef8d1c79bb82df5d1bf578af640bec850476b9bb437fe24b5e153703483a9b0a121a095d0768f6046116ad83", 0xb5}, {&(0x7f0000000740)="2bf7674e2214ba2824c3e3fbaaff2ca27b75e9fa09d3bea48bb0677af1cd41a8d9", 0x21}, {&(0x7f0000000780)="ddb2daffd72e1f30df942426d37f68129280870197424243b56c33fccf4e7a4ff6af7bf47fde9481e2f5f12965e106107eab2ec4b41a59a64b35da6f99824055d1b59dbac20624ec61b74747b28cfe8999d39a36304651793dfeb4c8922943c81ed644f033a239e8339eff378fe4e5ae4155982d29580780c27d491e62a776eac64f174552c477e07567aa3ac5df2aeb29f3d169fba4c0f938afabe748ac3ba8fdc150a7c7eeb0baf4d9600fa44e51442fbfcb687a675349207bd196277502daccc272f4d640b1e9bbf46af64ad23125", 0xd0}], 0x5, &(0x7f0000000940)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x40001) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="01000000010000000500080001"], 0x50) (rerun: 64) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=@bloom_filter={0x1e, 0x2, 0x40, 0x7, 0x4c0, r2, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2, 0x7}, 0x50) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003440)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x3, &(0x7f0000003ac0), 0x4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@map=r3, 0x6, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x4, 0x4}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x14, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r5}, &(0x7f00000001c0), &(0x7f0000000200)=r6}, 0x20) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r6}, 0xc) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) (async, rerun: 64) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) (rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0}, 0x90) close(0xffffffffffffffff) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x410, 0x2000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) (async, rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async, rerun: 32) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x4ca80, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x123c02, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 1m38.00983157s ago: executing program 3 (id=6105): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r1, &(0x7f0000000000), 0xfdef) recvmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/79, 0xce80}], 0x300}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x280b40, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0x10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="07000000040000008000000001"], 0x50) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1, 0x30}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 1m37.954412502s ago: executing program 1 (id=6106): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000080000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000070000008500000010"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}]}, 0x0, 0x6, 0x0, 0x0, 0x40f00, 0x8, '\x00', r2, @fallback=0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x6, 0x0, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=[{0x1, 0x2, 0x0, 0x3}], 0x10, 0x401}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x101, 0x5, 0x200, 0x40022, r0, 0x8, '\x00', r2, 0xffffffffffffffff, 0x5, 0x2, 0x2, 0x7}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000004c0)={r3, 0xffffffffffffffff}, 0x4) (async) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0x20, &(0x7f0000000ac0)={&(0x7f0000000840)=""/11, 0xb, 0x0, &(0x7f0000000a40)=""/66, 0x42}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{r0, 0xffffffffffffffff}, &(0x7f0000000b40), &(0x7f0000000b80)='%pB \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000c00)={r3, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x1, 0x1d, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x20}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x598}}, @map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000500)='syzkaller\x00', 0x4, 0xe1, &(0x7f0000000940)=""/225, 0x40f00, 0x24, '\x00', r2, @fallback=0xb, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x5, 0x7, 0x6, 0x2}, 0x10, r7, 0xffffffffffffffff, 0x6, &(0x7f0000000c40)=[r3, r0, r8, r9, r0, r0, r3], &(0x7f0000000c80)=[{0x3, 0x1, 0x10, 0x8}, {0x5, 0x2, 0x8, 0x3}, {0x1, 0x4, 0xd}, {0x5, 0x3, 0xe, 0x3}, {0x5, 0x4, 0x1, 0x8}, {0x0, 0x5, 0x2, 0xc}]}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b0000009d000000010001000900000001000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000020000000000000000000a07f0a3939135e6b613de8e185c69ba135ae6bddf2b4172287a26b0f45f29306aebb74fd3a346677810d627c94b3570cd4862d83e181f979d20ec5150e4c0e4389dee24aa416408da3bd033e70024433b385c5f6be4e4153c859b237a5867aceb4550060b41fe280897ac6eb0c0ec49d59f558dd42566b06b7e3768b96b2e741976fa310ae38ff9c025dd37a97af04a8e58f17313b61fd54b943b655791fefcdbf87"], 0x50) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1m37.912680644s ago: executing program 2 (id=6107): perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x5, 0x4, 0x8}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b"], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b1dbc423e3d705de3", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES32, @ANYRES64], 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_int(r2, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) 1m37.826520538s ago: executing program 4 (id=6108): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r7}, 0xc) syz_open_procfs$namespace(r4, &(0x7f0000000480)='ns/pid\x00') perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x8200}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x5, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m37.466200744s ago: executing program 4 (id=6110): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0x7, 0x5, 0x7, 0xc1, 0xffffffffffffffff, 0xeaf}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$unix(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x20000050) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd63"], 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff0ff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000400000006a0a80fe000000008500000053000000b70000000000000095000010000000004e62011c3034fdb117168bd07ba08af339d1a1ee35fe163a255c33282044b32495ef8ab9adc67ccc945ff15d802f5132143c0a9fc7a84452569957c1002ed7d458e17f791f4798c8eb484de03312c69b3edff5be26765ba5f8f2879021c2ea53ac547a654bbd2db5356b971d83dd12742be9087a3e7b7c0efd3e38c794eb06b0b8c392904ae7dd5e4dee88518ddf12dddd4bfc6a4dd3b6beba51074229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff2357ef17f95a25780c3a057826ef4e912f01a201e694e3049b8c8fe8b65d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cff7f4d8b9d8eaf302f0b2e0c252b0000000000000000ee917bca4885bbf597a14ab6458e6272d88e0c8088f404f011289ebc5623faa1182632161e073af1d69a2e36be115be3b325ecd201d2ffb0a7fa4f5d1106560cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222674280f55e98107450c19b861299fcd9ed9d8679406419406bf0c5329bd5b4697336112b0b8756ce3574046bf611a108f8df4d1a88597840b702b6fa8edfff8faf8b8ec039bab385cac0535373bb8fab90539b1a65ddff841eb671f7faf39a43a66c5540b8762b42007c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ccd4b19b53b60322af0aa66e8f448e1bd96822e6b70b62912c926dbe417cccd4f696d528fa8a3ea847f10e9b1106f3bb506f1d7fbdf801000000000000006c028eb5b5a073d0de5538ab42e171b3baae34c35987b0dda497ac3f5e97e60eaeea15c6d55badf9b86b1c000100006e60cd06c9ed24313ce607d403bb6030f800000000690db0221b1705c501f802ff59b4e683efa4b6e77e042072ec9eb8166f6e28b49a7705a1befc4d315878f88a8fb1dd679fb4c5557abae6849917dc51a89d47b728502f7e621fc0e3ba04020000c149ee6601728c750930519339b44197c22da865059b475afd96187d881e93b42a5fdfd686d8900c44c67133eeb0109dcb60dddad58037fda65885a15a42560ee3027a5ebf95254744f10fd607bc3100b94932b8d9447c42f6e21ee0e54f8be386bdc09decece910a481e648e0cb074536a25ff581d92af08a06f857311a2f14326b0b290205e91a682e00c8762cbc6b904c980eef6e6ae00f0000000000006a8194479700a02b92bec8d05eae1f24fdd7b80d3dde04c22f689594de2ebb9687219de8d73ac83823feb402a2415a9850d5f0183ec67be96dc0e4acd7acf1dfe79d6771903b76e2ae47d972651390c22d641030e1ddac018dc3116e1803af10a5f2b5f7ba58aca5bcabbbab24414a3810788e5503e4be66d683daac5f00000000000000001000ba96edb95ede0e1957c2a2754258d9fd028096cc15a8b912b494d4bbe609031ea1ca65a548941d5d16297757310d9daebd5a3dabbced3b051129cd60a37d397643324e6f0aadf978d639650000000000000000570b0acbcaa196e6b46e213a34c1a550e7c2d8cee7a278cee591f360e345d37dc9f8991a16c08d72317e42d2ac9126acd76130ef1086016697e4d51c4b42b2efc8edab88d46bc3d5d6e5a634c912bc40513643bf44cb416b3149040220aa39035ae46d16d879fc815a5cb84b0d5c8ad970128adf8dec1171e860ca54ce5d6a5aa0327bca4f49a710bf8a8399071237fe5d764e2034873c94a4f21287f3bce3eeb69e94df2e14e4ab10cc7834b304bc879b80255991dd7aac2e92c9e7c411c019d229c1f1e563152f1c5ae9cda3e808000000a0c779d624c5a2b7491b8f73e767389ecd1dee951353bb22b7caf89468871520823715cfebd04189c6c6b34bd8a6541f6bc0630000000000f94e85f5111add3a3cb5bcace95f38465402c39df835754ef33056b0e1134187822c001a25304f3e00b44675d0a25a21dc4023c642cc6f5a75c45a29ab933600acf9a2d471b73a73178cdf309e5d53311996215b44295dfddc1dd6b81132e999366e460d15d366e84da02b8afc40c47e733f804460ed8300ec34eab2ed80097bd32ff1a6143ab1476037e474ca876187c85bed4391215cd77e6a1fd6399a498b96b9b0cca93255acb08c67e50004c5af6fd5b4ce7c1ebc9202bd7b329a4d2530486d5999dd7f90ebecca37f2869135438f0540801fd7481daf9ec94b799c12e714d573e2a6331f496254f254a60c52b2026ed6a72c82cd191490fabe7b151f92e5d700f21830d613fbe490f305b3845a78817e59bf7ed36471dbca01d39e50ae2535460e1d2f2614940647233a02d5000000000000000000f70e52f0d56f6a4dcf7e57c03d4b4add0500000000000000320304d0d2b308c5ed3956eae263035d703f862224e9818a3d7ac270793a7bf2af87585293960a80ac63c54e55063bf8d24639e561253ef0caf6c58118120d8acecc0528f0d81d291009fc46401baf9c22d1c452a5b61b7a1b9adfcc17f5ad99dcdf935923185db7b14a7fa7babc1f53df70618bb73aa810b756696f26653b84cf842ae433fda59fbe312be11bb7dfecdc38c1c1f688d2724568cc396fca7c74984b7f7bd000000000000003ff3e5857fc6598c933610be374909dc8622b0722259e922f40d7862f7ea72f1754f07711de7600000000000000000000000000c4cb643e73ad8a45f0c7164484540e66e29943aa72297d831ce6c978866a55ed53130c6747f569c9c9abe724b4fc647b17401d2201e8c201e7d6ffa1fa122677f7393ed4fe8a93306f048b6703b04544e42a9cd937ef8d98ee8d878a12a627791c5c2d9fc6de65356be92fd98fdbe819686c7bd3be5bd0ce627c8357675f752c73a502d25c31c831078f098c34295bfe90e882843003841f4c0c65dc1810a50000000000000015911cb03e743c482199757d35df5b59fe0a0c5240c85498d818578e2d65c4ff4acbee037498222b1f81f3726a244da1fd6b8c195f1303bedb744045f31e1547d7bc3c3eae68b8da059a59c8c37e3639c2c4eb3d8229ac24d2ce12bc0e5db4a8202d72e64d5c5eacd0d0c0cd7a879ed967f5a2bd39ae4cf7daf7c9fa1777d54fb5920c8434163f75062c62455bf6e23817a85d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r7, 0xfeffff, 0x113, 0x3f00f000, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) r8 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) write$cgroup_int(r8, &(0x7f0000000000)=0x3b, 0xffffffffffffffcc) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r9, 0x40000f0, 0xe40, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0x71e}, 0x28) socketpair(0x2c, 0xa, 0x5, &(0x7f0000000100)) 1m37.385534748s ago: executing program 3 (id=6111): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000001900000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}, 0x112048}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000007000000000000feffffff711206000000000095"], 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1m37.294790512s ago: executing program 1 (id=6112): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc8, 0x80001, 0x5, 0x5, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000071123a00000000009500000000000000b624be7df60ba4cebf999a11eb773df7e853813c3379787770dc2e2c2d4766251350f373999b8ea57c31a04ba15f69f3ca1303153800c8e14861ed2cad0f74c2d8c11c474e5e0513db91b333e8fc30c6a722fff3373ff1305d945408addcabf26695c21b2199ac6ee4107c7a1480c926d15a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000440)="6a87048655b42b", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f00000002c0)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffff7}, [@call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x5, 0x90, 0x7, 0xe, 0x0, 0xfffffffffffffff2, 0x28010, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0, 0xe}, 0x508, 0x6, 0x3d, 0x9, 0xffffffff, 0x1, 0x1, 0x0, 0x3d2af391, 0x0, 0xf}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="1e032800008c71ef288563"], 0xffdd) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x7, 0x6, &(0x7f0000000480)=@raw=[@alu={0x7, 0x0, 0x5, 0xa, 0x3, 0x50, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f00000004c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x7, 0x7, 0x7}, 0x10, r5, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000580)=[{0x2, 0x1, 0x3, 0xa}, {0x1, 0x5, 0x8, 0x8}, {0x5, 0x5, 0xc, 0x5}, {0x1, 0x5, 0xa, 0xc}, {0x2, 0x5, 0x3, 0x7}], 0x10, 0x6}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001000000000071273fa79d93014b8e3381b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)=':\\\x00') 1m37.11697129s ago: executing program 3 (id=6113): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0xb}, [], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) 1m36.996333096s ago: executing program 0 (id=6114): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x2, 0x2, 0x11, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x2}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b70400000000000085"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8001, '\x00', 0x0, r2, 0x1, 0x5}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000340)={r1}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000"], 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r4, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r13, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r12, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r5, 0x4) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x240000, 0x0) ioctl$TUNSETCARRIER(r14, 0x400454e2, &(0x7f0000000200)=0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) 1m36.996020266s ago: executing program 3 (id=6115): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.numa_stat\x00', 0x26e1, 0x0) close(r0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$SIOCSIFHWADDR(r0, 0x8b0d, &(0x7f0000000180)={'veth1_vlan\x00', @broadcast}) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd634936f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x82, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'hsr0\x00', 0x8000}) (async) close(r4) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="ab10000000000000000011000000", @ANYRES16=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (rerun: 32) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000100)='5\x81\x06\x00\x00\x00T\xbb\xb4\xa0\xfa\xe3\x1a\xe06\x1eI^|\xe9\xf0XRgC\x1aN\x0e\x1e\xa69\x94\xa0\xe3;-\x02\xe5\xbd\x98\xb9\xd4\x10\xa7\x8e\xc0\xf6\bNI\xf2\b\xb526\x91\xe0\x13\x13\xd3[\xccf\xa3x\x0e[:C\xbd-\xd3\xe7izT\x7f\xe5\r\xe3\x1c\xf2\xeb\xd2\xb8\x02\xf2p\xeb[\x8c\xf3?\x04I\x10\xad\x02\x13\x16\xc3\xa2E\xecO(\x02o\xc2w\xf3\x88\xa5hT\x98') (async, rerun: 32) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) (rerun: 32) 1m36.91690354s ago: executing program 3 (id=6116): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r1}, 0xc) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x88702, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r6 = openat$cgroup_int(r3, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)={[{0x2b, 'cpuset'}]}, 0x8) write$cgroup_int(r6, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x0, 0x200000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) socketpair(0x2a, 0x800, 0x829, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYRESDEC=r2], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x10000, 0xfffffffd, 0xfffffffd}, 0x10}, 0x94) 35.089929837s ago: executing program 32 (id=6114): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x2, 0x2, 0x11, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x2}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b70400000000000085"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8001, '\x00', 0x0, r2, 0x1, 0x5}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000340)={r1}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000"], 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r4, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r13, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r12, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r5, 0x4) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x240000, 0x0) ioctl$TUNSETCARRIER(r14, 0x400454e2, &(0x7f0000000200)=0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) 997.152545ms ago: executing program 33 (id=6112): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc8, 0x80001, 0x5, 0x5, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000071123a00000000009500000000000000b624be7df60ba4cebf999a11eb773df7e853813c3379787770dc2e2c2d4766251350f373999b8ea57c31a04ba15f69f3ca1303153800c8e14861ed2cad0f74c2d8c11c474e5e0513db91b333e8fc30c6a722fff3373ff1305d945408addcabf26695c21b2199ac6ee4107c7a1480c926d15a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000440)="6a87048655b42b", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f00000002c0)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffff7}, [@call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x5, 0x90, 0x7, 0xe, 0x0, 0xfffffffffffffff2, 0x28010, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0, 0xe}, 0x508, 0x6, 0x3d, 0x9, 0xffffffff, 0x1, 0x1, 0x0, 0x3d2af391, 0x0, 0xf}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="1e032800008c71ef288563"], 0xffdd) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x7, 0x6, &(0x7f0000000480)=@raw=[@alu={0x7, 0x0, 0x5, 0xa, 0x3, 0x50, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f00000004c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x7, 0x7, 0x7}, 0x10, r5, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000580)=[{0x2, 0x1, 0x3, 0xa}, {0x1, 0x5, 0x8, 0x8}, {0x5, 0x5, 0xc, 0x5}, {0x1, 0x5, 0xa, 0xc}, {0x2, 0x5, 0x3, 0x7}], 0x10, 0x6}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001000000000071273fa79d93014b8e3381b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)=':\\\x00') 639.363712ms ago: executing program 34 (id=6107): perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x5, 0x4, 0x8}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b"], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b1dbc423e3d705de3", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES32, @ANYRES64], 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_int(r2, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) 219.187571ms ago: executing program 35 (id=6116): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r1}, 0xc) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x88702, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r6 = openat$cgroup_int(r3, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)={[{0x2b, 'cpuset'}]}, 0x8) write$cgroup_int(r6, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x0, 0x200000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) socketpair(0x2a, 0x800, 0x829, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYRESDEC=r2], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x10000, 0xfffffffd, 0xfffffffd}, 0x10}, 0x94) 0s ago: executing program 36 (id=6110): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0x7, 0x5, 0x7, 0xc1, 0xffffffffffffffff, 0xeaf}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$unix(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x20000050) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd63"], 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r7, 0xfeffff, 0x113, 0x3f00f000, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) r8 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) write$cgroup_int(r8, &(0x7f0000000000)=0x3b, 0xffffffffffffffcc) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r9, 0x40000f0, 0xe40, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0x71e}, 0x28) socketpair(0x2c, 0xa, 0x5, &(0x7f0000000100)) kernel console output (not intermixed with test programs): bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 436.664792][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.680662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 436.689471][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.704931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 436.718442][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.729496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 436.737531][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.651349][ C1] net_ratelimit: 483 callbacks suppressed [ 441.651396][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 441.653152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.662364][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 441.672391][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.691750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 441.697890][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.718855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 441.722810][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.741545][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 441.749890][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.660398][ C1] net_ratelimit: 447 callbacks suppressed [ 446.660435][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 446.661399][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.678621][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 446.681310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.703120][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 446.708750][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.719153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 446.728373][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.743632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 446.755108][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.669161][ C0] net_ratelimit: 730 callbacks suppressed [ 451.669196][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.692574][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 451.695216][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.715470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 451.718786][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.739490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 451.744145][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.761441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 451.767335][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.783476][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 456.684388][ C0] net_ratelimit: 22352 callbacks suppressed [ 456.684423][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 456.687369][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 456.693723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.707557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 456.716823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.733734][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 456.743715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.754280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 456.765054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.787417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 461.698485][ C0] net_ratelimit: 625 callbacks suppressed [ 461.698522][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.698656][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 461.706031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.722415][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 461.730730][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.747065][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 461.754611][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.771056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 461.781701][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.797176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 466.717492][ C1] net_ratelimit: 29562 callbacks suppressed [ 466.717561][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 466.719414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.725018][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 466.738033][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.748498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 466.761673][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.772838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 466.785852][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.796927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 466.812691][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.724110][ C1] net_ratelimit: 2118 callbacks suppressed [ 471.724168][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 471.727415][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.731936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 471.743785][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.756437][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 471.769254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.781476][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 471.793353][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.805517][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 471.819185][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.728207][ C0] net_ratelimit: 1008 callbacks suppressed [ 476.728243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.730208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 476.735403][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.752907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 476.759492][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.774237][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 476.786433][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.799967][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 476.807407][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.824956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 481.753751][ C1] net_ratelimit: 1485 callbacks suppressed [ 481.753860][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 481.755131][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.763817][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 481.774510][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.788096][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 481.798491][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.812897][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 481.822900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.836877][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 481.849440][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.759282][ C1] net_ratelimit: 1973 callbacks suppressed [ 486.759337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 486.760654][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.765955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 486.782533][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 486.790574][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 486.803194][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 486.815005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 486.827492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.839185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 486.851893][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.768168][ C0] net_ratelimit: 53175 callbacks suppressed [ 491.768181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.769310][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 491.774278][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.787309][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 491.798173][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.811268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 491.822073][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.822126][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.822254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.835267][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 496.778176][ C0] net_ratelimit: 87983 callbacks suppressed [ 496.778190][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 496.781472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 496.784261][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.816385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 496.820192][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.840351][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 496.844185][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.867361][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 496.868061][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.889120][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 501.788312][ C0] net_ratelimit: 56780 callbacks suppressed [ 501.788325][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 501.794649][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 501.806297][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 501.828199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 501.830616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.847218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 501.854477][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 501.854604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.871217][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 501.878468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.798163][ C0] net_ratelimit: 61418 callbacks suppressed [ 506.798177][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.801897][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 506.804170][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.804278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.804315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.804378][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.804621][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 506.804670][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 506.804741][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.820916][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 511.808174][ C1] net_ratelimit: 87058 callbacks suppressed [ 511.808189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 511.808297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.814172][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 511.830826][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.838352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 511.838405][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 511.838465][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 511.838518][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 511.838571][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 511.838623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 516.818171][ C0] net_ratelimit: 93087 callbacks suppressed [ 516.818183][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.819376][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 516.824270][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.838234][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 516.848380][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 516.848432][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 516.848482][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.848530][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 516.848641][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.848723][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.828241][ C0] net_ratelimit: 86431 callbacks suppressed [ 521.828254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 521.831551][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 521.834231][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 521.834284][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.834336][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 521.834456][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.834523][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.834635][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.834674][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 521.834733][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.838182][ C1] net_ratelimit: 100446 callbacks suppressed [ 526.838193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 526.844469][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.856433][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 526.871318][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.880411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 526.899019][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.904661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 526.918477][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.928644][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 526.947348][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 531.848151][ C1] net_ratelimit: 96470 callbacks suppressed [ 531.848165][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 531.862121][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.866346][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 531.880469][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.890498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 531.890561][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 531.890614][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 531.890669][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 531.890721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 531.890772][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 536.858152][ C1] net_ratelimit: 99330 callbacks suppressed [ 536.858167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 536.859097][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 536.864295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 536.864346][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 536.864427][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 536.880715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.888489][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 536.902345][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.912717][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 536.929098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.868176][ C1] net_ratelimit: 111642 callbacks suppressed [ 541.868189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 541.881115][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.886330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 541.903480][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.910380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 541.927686][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 541.934905][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 541.934955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 541.948403][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 541.958968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 546.878166][ C1] net_ratelimit: 110824 callbacks suppressed [ 546.878179][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 546.880002][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.884324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 546.884375][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 546.884425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 546.884476][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 546.884532][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 546.884582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 546.884627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 546.898891][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.198520][ T26] INFO: task kworker/u4:2:49 blocked for more than 136 seconds. [ 547.206192][ T26] Tainted: G W syzkaller #0 [ 547.308541][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 547.317247][ T26] task:kworker/u4:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00004000 [ 547.409312][ T26] Workqueue: netns cleanup_net [ 547.414109][ T26] Call Trace: [ 547.417406][ T26] __schedule+0xb53/0x1320 [ 547.448642][ T26] ? __sched_text_start+0x8/0x8 [ 547.453538][ T26] ? __mutex_add_waiter+0x180/0x280 [ 547.489447][ T26] ? __kasan_check_write+0x14/0x20 [ 547.494594][ T26] ? kthread_data+0x50/0xc0 [ 547.538418][ T26] ? wq_worker_sleeping+0x60/0x200 [ 547.543620][ T26] schedule+0x13c/0x1d0 [ 547.547865][ T26] schedule_preempt_disabled+0x13/0x20 [ 547.581839][ T26] __mutex_lock+0x6cc/0xc60 [ 547.586372][ T26] ? pcpu_free_area+0x9c0/0xbe0 [ 547.608797][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 547.615588][ T26] ? free_percpu+0xfd/0xa20 [ 547.648824][ T26] __mutex_lock_slowpath+0xe/0x10 [ 547.653996][ T26] mutex_lock+0xdb/0xf0 [ 547.689445][ T26] ? mutex_trylock+0xa0/0xa0 [ 547.694101][ T26] ? kobject_put+0x1a8/0x270 [ 547.738735][ T26] ? put_device+0x1f/0x30 [ 547.743167][ T26] ? free_netdev+0x384/0x480 [ 547.747761][ T26] rtnl_lock+0x15/0x20 [ 547.777154][ T26] netdev_run_todo+0xb5b/0xd50 [ 548.258642][ T26] ? netdev_refcnt_read+0x1d0/0x1d0 [ 548.263896][ T26] ? unregister_netdevice_queue+0x1aa/0x370 [ 548.298562][ T26] ? list_netdevice+0x4c0/0x4c0 [ 548.303458][ T26] ? mutex_lock+0xdb/0xf0 [ 548.307973][ T26] ? mutex_trylock+0xa0/0xa0 [ 548.358394][ T26] ? list_netdevice+0x4c0/0x4c0 [ 548.363493][ T26] rtnl_unlock+0xe/0x10 [ 548.367702][ T26] ip_tunnel_delete_nets+0x350/0x3a0 [ 548.598678][ T26] ? ip_tunnel_bind_dev+0x740/0x740 [ 548.603923][ T26] ? xfrmi6_err+0x640/0x640 [ 548.639422][ T26] erspan_exit_batch_net+0x22/0x30 [ 548.839917][ T26] ? erspan_init_net+0x30/0x30 [ 548.845260][ T26] cleanup_net+0x603/0xb80 [ 548.878564][ T26] ? __kasan_check_write+0x14/0x20 [ 548.883729][ T26] ? ops_init+0x4a0/0x4a0 [ 548.888105][ T26] ? read_word_at_a_time+0x12/0x20 [ 549.163433][ T26] ? strscpy+0x9b/0x290 [ 549.167695][ T26] process_one_work+0x6e1/0xba0 [ 549.204066][ T26] worker_thread+0xa6a/0x13c0 [ 549.219942][ T26] kthread+0x346/0x3d0 [ 549.224137][ T26] ? worker_clr_flags+0x190/0x190 [ 549.246447][ T26] ? kthread_blkcg+0xd0/0xd0 [ 549.268798][ T26] ret_from_fork+0x1f/0x30 [ 549.273462][ T26] INFO: task kworker/u4:5:439 blocked for more than 138 seconds. [ 549.308577][ T26] Tainted: G W syzkaller #0 [ 549.315034][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 549.368509][ T26] task:kworker/u4:5 state:D stack: 0 pid: 439 ppid: 2 flags:0x00004000 [ 549.377760][ T26] Workqueue: events_unbound linkwatch_event [ 549.418169][ T26] Call Trace: [ 549.421579][ T26] __schedule+0xb53/0x1320 [ 549.425996][ T26] ? __sched_text_start+0x8/0x8 [ 549.468871][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 549.474114][ T26] ? __kasan_check_write+0x14/0x20 [ 549.508354][ T26] ? kthread_data+0x50/0xc0 [ 549.512896][ T26] ? wq_worker_sleeping+0x60/0x200 [ 549.518005][ T26] schedule+0x13c/0x1d0 [ 549.558830][ T26] schedule_preempt_disabled+0x13/0x20 [ 549.564319][ T26] __mutex_lock+0x6cc/0xc60 [ 549.588888][ T26] ? __this_cpu_preempt_check+0x13/0x20 [ 549.594468][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 549.698852][ T26] ? perf_sched_cb_inc+0x240/0x240 [ 549.704197][ T26] ? _raw_spin_unlock_irq+0x4e/0x70 [ 549.728994][ T26] __mutex_lock_slowpath+0xe/0x10 [ 549.734226][ T26] mutex_lock+0xdb/0xf0 [ 549.769297][ T26] ? mutex_trylock+0xa0/0xa0 [ 549.773968][ T26] ? read_word_at_a_time+0x12/0x20 [ 549.824832][ T26] rtnl_lock+0x15/0x20 [ 549.830626][ T26] linkwatch_event+0xe/0x60 [ 549.835133][ T26] process_one_work+0x6e1/0xba0 [ 549.879088][ T26] worker_thread+0xa6a/0x13c0 [ 549.883819][ T26] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 550.104669][ T26] ? __kasan_check_read+0x11/0x20 [ 550.128567][ T26] kthread+0x346/0x3d0 [ 550.132668][ T26] ? worker_clr_flags+0x190/0x190 [ 550.137778][ T26] ? kthread_blkcg+0xd0/0xd0 [ 550.178971][ T26] ret_from_fork+0x1f/0x30 [ 550.183488][ T26] INFO: task syz.4.6110:20873 blocked for more than 139 seconds. [ 550.449056][ T26] Tainted: G W syzkaller #0 [ 550.455413][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 550.479318][ T26] task:syz.4.6110 state:D stack: 0 pid:20873 ppid: 18994 flags:0x00004004 [ 550.506475][ T26] Call Trace: [ 550.519081][ T26] __schedule+0xb53/0x1320 [ 550.523509][ T26] ? __sched_text_start+0x8/0x8 [ 550.556683][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 550.571728][ T26] ? __kasan_check_write+0x14/0x20 [ 550.576859][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 550.622071][ T26] schedule+0x13c/0x1d0 [ 550.626266][ T26] schedule_preempt_disabled+0x13/0x20 [ 550.653225][ T26] __mutex_lock+0x6cc/0xc60 [ 550.657856][ T26] ? pcpu_free_area+0x9c0/0xbe0 [ 550.698938][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 550.705726][ T26] ? free_percpu+0xfd/0xa20 [ 550.738886][ T26] __mutex_lock_slowpath+0xe/0x10 [ 550.744129][ T26] mutex_lock+0xdb/0xf0 [ 550.779237][ T26] ? mutex_trylock+0xa0/0xa0 [ 550.783852][ T26] ? kobject_put+0x1a8/0x270 [ 550.829318][ T26] ? put_device+0x1f/0x30 [ 550.833678][ T26] ? free_netdev+0x384/0x480 [ 550.869413][ T26] rtnl_lock+0x15/0x20 [ 550.873515][ T26] netdev_run_todo+0xb5b/0xd50 [ 550.909465][ T26] ? netdev_refcnt_read+0x1d0/0x1d0 [ 550.914696][ T26] ? netdev_state_change+0xa6/0x230 [ 550.949784][ T26] ? netdev_features_change+0x190/0x190 [ 550.955361][ T26] ? tun_chr_open+0x540/0x540 [ 551.149544][ T26] rtnl_unlock+0xe/0x10 [ 551.153742][ T26] tun_chr_close+0xc4/0x140 [ 551.179264][ T26] __fput+0x2fb/0x770 [ 551.183279][ T26] ____fput+0x15/0x20 [ 551.187263][ T26] task_work_run+0x127/0x190 [ 551.218328][ T26] exit_to_user_mode_loop+0xcb/0xe0 [ 551.223554][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 551.251178][ T26] syscall_exit_to_user_mode+0x1d/0x40 [ 551.256859][ T26] do_syscall_64+0x3d/0x40 [ 551.298525][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 551.304567][ T26] RIP: 0033:0x7f21c0882799 [ 551.338829][ T26] RSP: 002b:00007f21bf2dd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 551.347272][ T26] RAX: 0000000000000000 RBX: 00007f21c0afbfa0 RCX: 00007f21c0882799 [ 551.498916][ T26] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 551.506933][ T26] RBP: 00007f21c0918c99 R08: 0000000000000000 R09: 0000000000000000 [ 551.548586][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 551.556696][ T26] R13: 00007f21c0afc038 R14: 00007f21c0afbfa0 R15: 00007ffcf089ee38 [ 551.598559][ T26] INFO: task syz.1.6112:20878 blocked for more than 141 seconds. [ 551.606398][ T26] Tainted: G W syzkaller #0 [ 551.648296][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 551.656993][ T26] task:syz.1.6112 state:D stack: 0 pid:20878 ppid: 10556 flags:0x00004004 [ 551.698152][ T26] Call Trace: [ 551.701477][ T26] __schedule+0xb53/0x1320 [ 551.705984][ T26] ? __sched_text_start+0x8/0x8 [ 551.749537][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 551.879518][ T26] ? __kasan_check_write+0x14/0x20 [ 551.884757][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 551.890753][ C0] net_ratelimit: 65712 callbacks suppressed [ 551.890764][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.890848][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.891016][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 551.891072][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 551.891128][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.891186][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 551.891315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.891384][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.891506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.891547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 552.359048][ T26] schedule+0x13c/0x1d0 [ 552.363284][ T26] schedule_preempt_disabled+0x13/0x20 [ 552.500175][ T26] __mutex_lock+0x6cc/0xc60 [ 552.504835][ T26] ? fput_many+0xe7/0x1a0 [ 552.530288][ T26] ? fput+0x1a/0x20 [ 552.534135][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 552.561909][ T26] ? memset+0x35/0x40 [ 552.565976][ T26] __mutex_lock_slowpath+0xe/0x10 [ 552.593224][ T26] mutex_lock+0xdb/0xf0 [ 552.597409][ T26] ? mutex_trylock+0xa0/0xa0 [ 552.629211][ T26] ? tun_chr_open+0x540/0x540 [ 552.633923][ T26] rtnl_lock+0x15/0x20 [ 552.637991][ T26] tun_chr_close+0x40/0x140 [ 552.659195][ T26] __fput+0x2fb/0x770 [ 552.663288][ T26] ____fput+0x15/0x20 [ 552.667311][ T26] task_work_run+0x127/0x190 [ 552.688449][ T26] exit_to_user_mode_loop+0xcb/0xe0 [ 552.693816][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 552.719040][ T26] syscall_exit_to_user_mode+0x1d/0x40 [ 552.724542][ T26] do_syscall_64+0x3d/0x40 [ 552.730935][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 552.736840][ T26] RIP: 0033:0x7fa828553799 [ 552.759330][ T26] RSP: 002b:00007fa826fae028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 552.767763][ T26] RAX: 0000000000000000 RBX: 00007fa8287ccfa0 RCX: 00007fa828553799 [ 552.798682][ T26] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 552.806697][ T26] RBP: 00007fa8285e9c99 R08: 0000000000000000 R09: 0000000000000000 [ 552.838436][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 552.846539][ T26] R13: 00007fa8287cd038 R14: 00007fa8287ccfa0 R15: 00007ffed807bcc8 [ 552.958277][ T26] INFO: task syz.1.6112:20892 blocked for more than 142 seconds. [ 552.966030][ T26] Tainted: G W syzkaller #0 [ 553.089476][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 553.158724][ T26] task:syz.1.6112 state:D stack: 0 pid:20892 ppid: 10556 flags:0x00004004 [ 553.167970][ T26] Call Trace: [ 553.189405][ T26] __schedule+0xb53/0x1320 [ 553.193849][ T26] ? __sched_text_start+0x8/0x8 [ 553.218329][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 553.223646][ T26] ? __kasan_check_write+0x14/0x20 [ 553.238684][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 553.244509][ T26] schedule+0x13c/0x1d0 [ 553.268170][ T26] schedule_preempt_disabled+0x13/0x20 [ 553.273654][ T26] __mutex_lock+0x6cc/0xc60 [ 553.289494][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 553.296365][ T26] __mutex_lock_slowpath+0xe/0x10 [ 553.318165][ T26] mutex_lock+0xdb/0xf0 [ 553.322340][ T26] ? mutex_trylock+0xa0/0xa0 [ 553.326927][ T26] ? full_name_hash+0xa0/0xf0 [ 553.348372][ T26] ? dev_get_by_name_rcu+0xc8/0xf0 [ 553.353502][ T26] rtnl_lock+0x15/0x20 [ 553.357582][ T26] dev_ioctl+0x542/0xb80 [ 553.378501][ T26] sock_do_ioctl+0x27b/0x380 [ 553.383121][ T26] ? sock_show_fdinfo+0xa0/0xa0 [ 553.388062][ T26] ? selinux_file_ioctl+0x3a0/0x4d0 [ 553.408846][ T26] sock_ioctl+0x4bd/0x760 [ 553.413196][ T26] ? sock_poll+0x350/0x350 [ 553.417615][ T26] ? __fget_files+0x2c4/0x320 [ 553.439152][ T26] ? security_file_ioctl+0x84/0xa0 [ 553.444291][ T26] ? sock_poll+0x350/0x350 [ 553.468214][ T26] __se_sys_ioctl+0x121/0x1a0 [ 553.472912][ T26] __x64_sys_ioctl+0x7b/0x90 [ 553.477504][ T26] do_syscall_64+0x31/0x40 [ 553.498766][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 553.505077][ T26] RIP: 0033:0x7fa828553799 [ 553.528386][ T26] RSP: 002b:00007fa826f6c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 553.536844][ T26] RAX: ffffffffffffffda RBX: 00007fa8287cd180 RCX: 00007fa828553799 [ 553.558983][ T26] RDX: 00002000000000c0 RSI: 0000000000008914 RDI: 0000000000000006 [ 553.567192][ T26] RBP: 00007fa8285e9c99 R08: 0000000000000000 R09: 0000000000000000 [ 553.598811][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 553.606979][ T26] R13: 00007fa8287cd218 R14: 00007fa8287cd180 R15: 00007ffed807bcc8 [ 553.638727][ T26] NMI backtrace for cpu 1 [ 553.643094][ T26] CPU: 1 PID: 26 Comm: khungtaskd Tainted: G W syzkaller #0 [ 553.651799][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 553.661940][ T26] Call Trace: [ 553.665233][ T26] __dump_stack+0x21/0x24 [ 553.669563][ T26] dump_stack_lvl+0x1a7/0x208 [ 553.674338][ T26] ? show_regs_print_info+0x18/0x18 [ 553.679540][ T26] ? sched_show_task+0x31c/0x480 [ 553.684598][ T26] ? __rcu_read_unlock+0xa0/0xa0 [ 553.689541][ T26] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 553.695738][ T26] dump_stack+0x15/0x1c [ 553.699904][ T26] nmi_trigger_cpumask_backtrace+0x27f/0x2c0 [ 553.705974][ T26] arch_trigger_cpumask_backtrace+0x10/0x20 [ 553.711950][ T26] watchdog+0xe2d/0xf80 [ 553.716213][ T26] ? hungtask_pm_notify+0x50/0x50 [ 553.721346][ T26] ? __kasan_check_read+0x11/0x20 [ 553.726933][ T26] ? __kthread_parkme+0xb9/0x1c0 [ 553.732047][ T26] kthread+0x346/0x3d0 [ 553.736205][ T26] ? hungtask_pm_notify+0x50/0x50 [ 553.741226][ T26] ? kthread_blkcg+0xd0/0xd0 [ 553.745998][ T26] ret_from_fork+0x1f/0x30 [ 553.751983][ T26] Sending NMI from CPU 1 to CPUs 0: [ 553.759197][ C0] NMI backtrace for cpu 0 [ 553.759204][ C0] CPU: 0 PID: 20863 Comm: syz.2.6107 Tainted: G W syzkaller #0 [ 553.759209][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 553.759214][ C0] RIP: 0010:native_apic_msr_write+0x39/0x50 [ 553.759226][ C0] Code: 74 05 83 ff 30 75 12 5d c3 81 ff d0 00 00 00 74 f6 81 ff e0 00 00 00 74 ee c1 ef 04 81 c7 00 08 00 00 89 f9 89 f0 31 d2 0f 30 <0f> 1f 44 00 00 eb d6 89 f6 31 d2 e8 97 51 2b 01 5d c3 0f 1f 44 00 [ 553.759231][ C0] RSP: 0018:ffffc900000070c8 EFLAGS: 00000046 [ 553.759241][ C0] RAX: 000000000000015c RBX: 000000000000015c RCX: 0000000000000838 [ 553.759247][ C0] RDX: 0000000000000000 RSI: 000000000000015c RDI: 0000000000000838 [ 553.759253][ C0] RBP: ffffc900000070c8 R08: ffff888127520000 R09: 0000000000000002 [ 553.759258][ C0] R10: 0000000000000003 R11: 0000000000010102 R12: ffff8881f7026ea8 [ 553.759264][ C0] R13: ffff8881f7026e88 R14: ffffffff85bf6998 R15: dffffc0000000000 [ 553.759270][ C0] FS: 00007f85aa6fe6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 553.759275][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 553.759281][ C0] CR2: 00007faa52fd3d7e CR3: 0000000113577000 CR4: 00000000003506b0 [ 553.759286][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 553.759291][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 553.759294][ C0] Call Trace: [ 553.759297][ C0] [ 553.759301][ C0] lapic_next_event+0x5f/0x70 [ 553.759305][ C0] clockevents_program_event+0x1fa/0x8b0 [ 553.759309][ C0] tick_program_event+0xa3/0x120 [ 553.759313][ C0] hrtimer_interrupt+0x3f9/0xdc0 [ 553.759317][ C0] __sysvec_apic_timer_interrupt+0xfa/0x3f0 [ 553.759321][ C0] sysvec_apic_timer_interrupt+0xba/0xe0 [ 553.759326][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 553.759330][ C0] RIP: 0010:stack_trace_consume_entry+0x12c/0x290 [ 553.759342][ C0] Code: c4 4c 89 cb e8 d5 ac 4a 00 49 89 d9 4d 89 e0 4c 89 f2 48 8b 75 c0 49 89 37 41 8b 18 41 0f b6 44 15 00 84 c0 0f 85 3d 01 00 00 <41> 3b 19 0f 92 c0 48 83 c4 20 5b 41 5c 41 5d 41 5e 41 5f 5d c3 44 [ 553.759347][ C0] RSP: 0018:ffffc900000073f0 EFLAGS: 00000246 [ 553.759355][ C0] RAX: 0000000000000000 RBX: 0000000000000011 RCX: 0000000000007401 [ 553.759361][ C0] RDX: dffffc0000000000 RSI: ffffffff813c20e9 RDI: ffffc90000007500 [ 553.759366][ C0] RBP: ffffc90000007438 R08: ffffc90000007510 R09: ffffc90000007508 [ 553.759372][ C0] R10: 0000000000000010 R11: fffff52000000e95 R12: ffffc9000000750c [ 553.759377][ C0] R13: 1ffff92000000ea1 R14: ffffc90000007590 R15: ffffc90000007610 [ 553.759380][ C0] ? irq_exit_rcu+0x9/0x10 [ 553.759384][ C0] ? irq_exit_rcu+0x9/0x10 [ 553.759388][ C0] ? stack_trace_save+0xf0/0xf0 [ 553.759392][ C0] arch_stack_walk+0xfc/0x140 [ 553.759395][ C0] ? irq_exit_rcu+0x9/0x10 [ 553.759399][ C0] stack_trace_save+0xa6/0xf0 [ 553.759402][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 553.759406][ C0] ? memset+0x35/0x40 [ 553.759410][ C0] __kasan_slab_alloc+0xbd/0xf0 [ 553.759413][ C0] ? __kasan_slab_alloc+0xbd/0xf0 [ 553.759418][ C0] ? slab_post_alloc_hook+0x5d/0x2f0 [ 553.759422][ C0] ? kmem_cache_alloc+0x162/0x2d0 [ 553.759425][ C0] ? skb_clone+0x1e9/0x380 [ 553.759429][ C0] ? maybe_deliver+0x1ad/0x2b0 [ 553.759432][ C0] ? br_flood+0x2e7/0x420 [ 553.759436][ C0] ? br_handle_frame_finish+0xd3e/0x11a0 [ 553.759440][ C0] ? br_handle_frame+0x407/0x8e0 [ 553.759444][ C0] ? __netif_receive_skb_core+0xed9/0x3080 [ 553.759448][ C0] ? __netif_receive_skb+0x72/0x280 [ 553.759452][ C0] ? process_backlog+0x368/0x600 [ 553.759456][ C0] ? net_rx_action+0x44d/0xe00 [ 553.759459][ C0] ? __do_softirq+0x255/0x563 [ 553.759463][ C0] ? asm_call_irq_on_stack+0xf/0x20 [ 553.759467][ C0] ? do_softirq_own_stack+0x60/0x80 [ 553.759470][ C0] ? __irq_exit_rcu+0x128/0x150 [ 553.759474][ C0] ? irq_exit_rcu+0x9/0x10 [ 553.759478][ C0] slab_post_alloc_hook+0x5d/0x2f0 [ 553.759482][ C0] ? skb_clone+0x1e9/0x380 [ 553.759485][ C0] ? skb_clone+0x1e9/0x380 [ 553.759489][ C0] kmem_cache_alloc+0x162/0x2d0 [ 553.759494][ C0] ? br_multicast_has_querier_adjacent+0x1f0/0x1f0 [ 553.759497][ C0] ? skb_clone+0x1e9/0x380 [ 553.759501][ C0] skb_clone+0x1e9/0x380 [ 553.759505][ C0] maybe_deliver+0x1ad/0x2b0 [ 553.759508][ C0] br_flood+0x2e7/0x420 [ 553.759513][ C0] br_handle_frame_finish+0xd3e/0x11a0 [ 553.759517][ C0] ? brport_get_ownership+0x80/0x80 [ 553.759521][ C0] ? __irq_exit_rcu+0x40/0x150 [ 553.759524][ C0] ? irq_exit_rcu+0x9/0x10 [ 553.759528][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 553.759532][ C0] br_handle_frame+0x407/0x8e0 [ 553.759536][ C0] ? br_get_rx_handler+0x20/0x20 [ 553.759539][ C0] __netif_receive_skb_core+0xed9/0x3080 [ 553.759543][ C0] ? kfree_skb+0xc1/0x2f0 [ 553.759546][ C0] ? set_rps_cpu+0x5d0/0x5d0 [ 553.759549][ C0] ? ipv6_rcv+0xf0/0x230 [ 553.759553][ C0] ? ip6_rcv_finish+0x360/0x360 [ 553.759557][ C0] ? refcount_add+0x80/0x80 [ 553.759562][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 553.759565][ C0] __netif_receive_skb+0x72/0x280 [ 553.759569][ C0] process_backlog+0x368/0x600 [ 553.759573][ C0] net_rx_action+0x44d/0xe00 [ 553.759577][ C0] ? net_tx_action+0x530/0x530 [ 553.759581][ C0] __do_softirq+0x255/0x563 [ 553.759585][ C0] asm_call_irq_on_stack+0xf/0x20 [ 553.759588][ C0] [ 553.759592][ C0] do_softirq_own_stack+0x60/0x80 [ 553.759595][ C0] __irq_exit_rcu+0x128/0x150 [ 553.759599][ C0] irq_exit_rcu+0x9/0x10 [ 553.759603][ C0] sysvec_apic_timer_interrupt+0xbf/0xe0 [ 553.759607][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 553.759611][ C0] RIP: 0010:_raw_spin_unlock_irq+0x49/0x70 [ 553.759623][ C0] Code: 12 48 89 fb 48 c7 c7 b0 6b 4c 86 e8 b1 78 1c fd 48 89 df 48 83 3d e6 b0 c9 01 00 74 27 e8 83 1f c9 fc 66 90 fb bf 01 00 00 00 22 17 c2 fc 65 8b 05 a7 b2 7f 7b 85 c0 74 03 5b 5d c3 e8 a3 b2 [ 553.759627][ C0] RSP: 0018:ffffc900015c68e8 EFLAGS: 00000246 [ 553.759636][ C0] RAX: 0000000000000001 RBX: dffffc0000000000 RCX: dffffc0000000000 [ 553.759641][ C0] RDX: 0000000040000002 RSI: 0000000000000000 RDI: 0000000000000001 [ 553.759646][ C0] RBP: ffffc900015c68f0 R08: ffffffff86c37c53 R09: 1ffffffff0d86f8a [ 553.759652][ C0] R10: dffffc0000000000 R11: fffffbfff0d86f8b R12: ffff8881f7055fc0 [ 553.759657][ C0] R13: ffff888100293b6c R14: ffff88810d478000 R15: ffff888127520000 [ 553.759662][ C0] ? _raw_spin_unlock_irq+0x41/0x70 [ 553.759665][ C0] finish_task_switch+0x12e/0x5a0 [ 553.759669][ C0] ? __switch_to_asm+0x34/0x60 [ 553.759673][ C0] __schedule+0xb5b/0x1320 [ 553.759677][ C0] ? __sched_text_start+0x8/0x8 [ 553.759681][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 553.759685][ C0] preempt_schedule_irq+0xaa/0x120 [ 553.759690][ C0] ? preempt_schedule_notrace+0x120/0x120 [ 553.759693][ C0] ? __irq_exit_rcu+0x40/0x150 [ 553.759697][ C0] irqentry_exit+0x56/0x60 [ 553.759701][ C0] sysvec_apic_timer_interrupt+0xcb/0xe0 [ 553.759706][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 553.759710][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x45/0x60 [ 553.759731][ C0] Code: ff 00 74 11 f7 c2 00 01 00 00 74 35 83 b9 dc 0a 00 00 00 74 2c 8b 91 b8 0a 00 00 83 fa 02 75 21 48 8b 91 c0 0a 00 00 48 8b 32 <48> 8d 7e 01 8b 89 bc 0a 00 00 48 39 cf 73 08 48 89 44 f2 08 48 89 [ 553.759736][ C0] RSP: 0018:ffffc900015c6be8 EFLAGS: 00000246 [ 553.759744][ C0] RAX: ffffffff81a3c9dc RBX: ffffea0004595e00 RCX: ffff888127520000 [ 553.759750][ C0] RDX: ffffc90002d41000 RSI: 0000000000032774 RDI: ffffea0004595e00 [ 553.759755][ C0] RBP: ffffc900015c6be8 R08: ffffea0004595e37 R09: 1ffffd40008b2bc6 [ 553.759761][ C0] R10: dffffc0000000000 R11: fffff940008b2bc7 R12: 0000000000000000 [ 553.759766][ C0] R13: ffffea0004595e18 R14: 0000000000116578 R15: ffffea0004595e00 [ 553.759770][ C0] ? __reset_page_owner+0x1c/0x140 [ 553.759773][ C0] __reset_page_owner+0x1c/0x140 [ 553.759778][ C0] free_unref_page_prepare+0x2b7/0x2d0 [ 553.759781][ C0] __free_pages+0x146/0x3b0 [ 553.759785][ C0] ? preempt_schedule+0xbc/0xd0 [ 553.759789][ C0] ? clear_zone_contiguous+0x50/0x50 [ 553.759793][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 553.759797][ C0] __free_slab+0xcf/0x190 [ 553.759800][ C0] discard_slab+0x29/0x40 [ 553.759804][ C0] __slab_free+0x313/0x3a0 [ 553.759807][ C0] ? irq_exit_rcu+0x9/0x10 [ 553.759812][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 553.759816][ C0] ? qlink_free+0x3e/0x90 [ 553.759819][ C0] ___cache_free+0x10e/0x130 [ 553.759823][ C0] qlink_free+0x50/0x90 [ 553.759826][ C0] qlist_free_all+0x5f/0xb0 [ 553.759831][ C0] kasan_quarantine_reduce+0x14a/0x160 [ 553.759834][ C0] __kasan_slab_alloc+0x2f/0xf0 [ 553.759838][ C0] ? __kasan_check_write+0x14/0x20 [ 553.759843][ C0] ? finish_task_switch+0x1b7/0x5a0 [ 553.759847][ C0] ? switch_mm_irqs_off+0x75f/0x990 [ 553.759851][ C0] ? __switch_to_asm+0x34/0x60 [ 553.759854][ C0] ? __schedule+0xb5b/0x1320 [ 553.759858][ C0] ? __sched_text_start+0x8/0x8 [ 553.759862][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 553.759865][ C0] ? __kasan_check_read+0x11/0x20 [ 553.759868][ C0] ? preempt_schedule_irq+0xca/0x120 [ 553.759871][ C0] ? preempt_schedule_notrace+0x120/0x120 [ 553.759874][ C0] ? __irq_exit_rcu+0x40/0x150 [ 553.759877][ C0] slab_post_alloc_hook+0x5d/0x2f0 [ 553.759879][ C0] ? __kernfs_new_node+0xe3/0x6b0 [ 553.759883][ C0] ? __kernfs_new_node+0xe3/0x6b0 [ 553.759885][ C0] kmem_cache_alloc+0x162/0x2d0 [ 553.759888][ C0] ? __kernfs_new_node+0xe3/0x6b0 [ 553.759891][ C0] __kernfs_new_node+0xe3/0x6b0 [ 553.759894][ C0] ? preempt_schedule_notrace+0x120/0x120 [ 553.759897][ C0] ? kernfs_new_node+0x260/0x260 [ 553.759899][ C0] ? irqentry_exit+0x56/0x60 [ 553.759902][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 553.759906][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 553.759908][ C0] kernfs_new_node+0x150/0x260 [ 553.759911][ C0] __kernfs_create_file+0x4e/0x270 [ 553.759914][ C0] sysfs_add_file_mode_ns+0x29a/0x350 [ 553.759917][ C0] internal_create_group+0x495/0xd00 [ 553.759920][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 553.759923][ C0] ? sysfs_create_group+0x30/0x30 [ 553.759926][ C0] sysfs_create_groups+0x58/0x120 [ 553.759929][ C0] device_add_attrs+0x155/0x430 [ 553.759932][ C0] ? device_add_class_symlinks+0x27e/0x2c0 [ 553.759934][ C0] device_add+0x504/0xc10 [ 553.759937][ C0] ? device_initialize+0x1e1/0x420 [ 553.759940][ C0] netdev_register_kobject+0x1bc/0x360 [ 553.759943][ C0] ? raw_notifier_call_chain+0xe9/0x100 [ 553.759946][ C0] register_netdevice+0xdf0/0x13e0 [ 553.759949][ C0] ? irq_exit_rcu+0x9/0x10 [ 553.759952][ C0] ? netif_stacked_transfer_operstate+0x220/0x220 [ 553.759955][ C0] ? alloc_netdev_mqs+0xa40/0xc80 [ 553.759958][ C0] register_netdev+0x3e/0x50 [ 553.759961][ C0] sit_init_net+0x246/0x480 [ 553.759963][ C0] ? ops_init+0x89/0x4a0 [ 553.759966][ C0] ops_init+0x1ba/0x4a0 [ 553.759968][ C0] ? setup_net+0x3ba/0xb60 [ 553.759971][ C0] setup_net+0x376/0xb60 [ 553.759974][ C0] ? copy_net_ns+0x520/0x520 [ 553.759976][ C0] ? __kasan_check_write+0x14/0x20 [ 553.759979][ C0] copy_net_ns+0x314/0x520 [ 553.759982][ C0] create_new_namespaces+0x3a2/0x650 [ 553.759985][ C0] copy_namespaces+0x1d1/0x220 [ 553.759987][ C0] ? copy_signal+0x4cb/0x600 [ 553.759990][ C0] copy_process+0x11d3/0x3300 [ 553.759993][ C0] ? irq_exit_rcu+0x9/0x10 [ 553.759996][ C0] ? __pidfd_prepare+0x150/0x150 [ 553.759998][ C0] ? kernel_clone+0x133/0x960 [ 553.760001][ C0] kernel_clone+0x233/0x960 [ 553.760004][ C0] ? create_io_thread+0x170/0x170 [ 553.760007][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 553.760010][ C0] ? sched_clock+0x3a/0x40 [ 553.760013][ C0] ? sched_clock_cpu+0x1b/0x3d0 [ 553.760015][ C0] __x64_sys_clone+0x198/0x210 [ 553.760018][ C0] ? __ia32_sys_vfork+0x130/0x130 [ 553.760021][ C0] ? switch_fpu_return+0x19c/0x330 [ 553.760024][ C0] ? __kasan_check_read+0x11/0x20 [ 553.760027][ C0] ? exit_to_user_mode_prepare+0x9a/0xa0 [ 553.760030][ C0] do_syscall_64+0x31/0x40 [ 553.760033][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 553.760035][ C0] RIP: 0033:0x7f85abcc4799 [ 553.760044][ C0] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 553.760047][ C0] RSP: 002b:00007f85aa6fdfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 553.760055][ C0] RAX: ffffffffffffffda RBX: 00007f85abf3e090 RCX: 00007f85abcc4799 [ 553.760059][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042164000 [ 553.760062][ C0] RBP: 00007f85abd5ac99 R08: 0000000000000000 R09: 0000000000000000 [ 553.760066][ C0] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 553.760070][ C0] R13: 00007f85abf3e128 R14: 00007f85abf3e090 R15: 00007ffe12b07728 [ 556.898179][ C1] net_ratelimit: 70279 callbacks suppressed [ 556.898192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 556.901793][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.904167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 556.904218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 556.904267][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 556.904318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 556.904373][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 556.904423][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 556.904472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 556.904529][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 561.908214][ C0] net_ratelimit: 90232 callbacks suppressed [ 561.908228][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.909623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 561.914192][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 561.927971][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 561.938390][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.938456][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.952072][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 561.962515][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.975932][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 561.987048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.918164][ C1] net_ratelimit: 85368 callbacks suppressed [ 566.918177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 566.918300][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.924190][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 566.940920][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.948434][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 566.964744][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.972481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 566.988175][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.996577][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 567.012134][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.928153][ C1] net_ratelimit: 98083 callbacks suppressed [ 571.928166][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 571.929677][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.934436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 571.952781][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.959091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 571.959146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 571.959212][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 571.959266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 571.959317][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 571.959367][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 575.339917][ T26] INFO: task kworker/u4:2:49 blocked for more than 164 seconds. [ 575.347697][ T26] Tainted: G W syzkaller #0 [ 575.388281][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 575.397351][ T26] task:kworker/u4:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00004000 [ 575.498632][ T26] Workqueue: netns cleanup_net [ 575.503438][ T26] Call Trace: [ 575.506844][ T26] __schedule+0xb53/0x1320 [ 575.541888][ T26] ? __sched_text_start+0x8/0x8 [ 575.546864][ T26] ? __mutex_add_waiter+0x180/0x280 [ 575.588324][ T26] ? __kasan_check_write+0x14/0x20 [ 575.593535][ T26] ? kthread_data+0x50/0xc0 [ 575.621048][ T26] ? wq_worker_sleeping+0x60/0x200 [ 575.626399][ T26] schedule+0x13c/0x1d0 [ 575.652423][ T26] schedule_preempt_disabled+0x13/0x20 [ 575.658025][ T26] __mutex_lock+0x6cc/0xc60 [ 575.694215][ T26] ? pcpu_free_area+0x9c0/0xbe0 [ 575.718304][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 575.725116][ T26] ? free_percpu+0xfd/0xa20 [ 575.758613][ T26] __mutex_lock_slowpath+0xe/0x10 [ 575.763754][ T26] mutex_lock+0xdb/0xf0 [ 575.768050][ T26] ? mutex_trylock+0xa0/0xa0 [ 575.819977][ T26] ? kobject_put+0x1a8/0x270 [ 575.824690][ T26] ? put_device+0x1f/0x30 [ 575.859407][ T26] ? free_netdev+0x384/0x480 [ 575.864038][ T26] rtnl_lock+0x15/0x20 [ 575.909481][ T26] netdev_run_todo+0xb5b/0xd50 [ 575.914376][ T26] ? netdev_refcnt_read+0x1d0/0x1d0 [ 575.948373][ T26] ? unregister_netdevice_queue+0x1aa/0x370 [ 575.954392][ T26] ? list_netdevice+0x4c0/0x4c0 [ 575.988456][ T26] ? mutex_lock+0xdb/0xf0 [ 576.179092][ T26] ? mutex_trylock+0xa0/0xa0 [ 576.183855][ T26] ? list_netdevice+0x4c0/0x4c0 [ 576.209261][ T26] rtnl_unlock+0xe/0x10 [ 576.213477][ T26] ip_tunnel_delete_nets+0x350/0x3a0 [ 576.248587][ T26] ? ip_tunnel_bind_dev+0x740/0x740 [ 576.253953][ T26] ? xfrmi6_err+0x640/0x640 [ 576.279501][ T26] erspan_exit_batch_net+0x22/0x30 [ 576.284659][ T26] ? erspan_init_net+0x30/0x30 [ 576.339361][ T26] cleanup_net+0x603/0xb80 [ 576.343832][ T26] ? __kasan_check_write+0x14/0x20 [ 576.368696][ T26] ? ops_init+0x4a0/0x4a0 [ 576.373617][ T26] ? read_word_at_a_time+0x12/0x20 [ 576.388471][ T26] ? strscpy+0x9b/0x290 [ 576.392797][ T26] process_one_work+0x6e1/0xba0 [ 576.397660][ T26] worker_thread+0xa6a/0x13c0 [ 576.419355][ T26] kthread+0x346/0x3d0 [ 576.423454][ T26] ? worker_clr_flags+0x190/0x190 [ 576.438403][ T26] ? kthread_blkcg+0xd0/0xd0 [ 576.443017][ T26] ret_from_fork+0x1f/0x30 [ 576.447469][ T26] INFO: task kworker/u4:5:439 blocked for more than 165 seconds. [ 576.478981][ T26] Tainted: G W syzkaller #0 [ 576.485426][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 576.509450][ T26] task:kworker/u4:5 state:D stack: 0 pid: 439 ppid: 2 flags:0x00004000 [ 576.538678][ T26] Workqueue: events_unbound linkwatch_event [ 576.544793][ T26] Call Trace: [ 576.548108][ T26] __schedule+0xb53/0x1320 [ 576.563875][ T26] ? __sched_text_start+0x8/0x8 [ 576.578661][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 576.583923][ T26] ? __kasan_check_write+0x14/0x20 [ 576.608534][ T26] ? kthread_data+0x50/0xc0 [ 576.613076][ T26] ? wq_worker_sleeping+0x60/0x200 [ 576.639365][ T26] schedule+0x13c/0x1d0 [ 576.643674][ T26] schedule_preempt_disabled+0x13/0x20 [ 576.650942][ T26] __mutex_lock+0x6cc/0xc60 [ 576.655465][ T26] ? __this_cpu_preempt_check+0x13/0x20 [ 576.678227][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 576.685030][ T26] ? perf_sched_cb_inc+0x240/0x240 [ 576.708413][ T26] ? _raw_spin_unlock_irq+0x4e/0x70 [ 576.713997][ T26] __mutex_lock_slowpath+0xe/0x10 [ 576.738687][ T26] mutex_lock+0xdb/0xf0 [ 576.742883][ T26] ? mutex_trylock+0xa0/0xa0 [ 576.747656][ T26] ? read_word_at_a_time+0x12/0x20 [ 576.768792][ T26] rtnl_lock+0x15/0x20 [ 576.772996][ T26] linkwatch_event+0xe/0x60 [ 576.777506][ T26] process_one_work+0x6e1/0xba0 [ 576.829401][ T26] worker_thread+0xa6a/0x13c0 [ 576.834119][ T26] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 576.848204][ T26] ? __kasan_check_read+0x11/0x20 [ 576.853247][ T26] kthread+0x346/0x3d0 [ 576.857387][ T26] ? worker_clr_flags+0x190/0x190 [ 576.879316][ T26] ? kthread_blkcg+0xd0/0xd0 [ 576.883950][ T26] ret_from_fork+0x1f/0x30 [ 576.909260][ T26] INFO: task syz.4.6110:20873 blocked for more than 166 seconds. [ 576.917015][ T26] Tainted: G W syzkaller #0 [ 576.938129][ C1] net_ratelimit: 93851 callbacks suppressed [ 576.938142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 576.938505][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.944134][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 576.960527][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 576.968439][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 576.968491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 576.968557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 576.968608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 576.968658][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 576.968708][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 576.969816][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 577.478597][ T26] task:syz.4.6110 state:D stack: 0 pid:20873 ppid: 18994 flags:0x00004004 [ 577.487842][ T26] Call Trace: [ 577.519407][ T26] __schedule+0xb53/0x1320 [ 577.523959][ T26] ? __sched_text_start+0x8/0x8 [ 577.539264][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 577.544413][ T26] ? __kasan_check_write+0x14/0x20 [ 577.600465][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 577.606392][ T26] schedule+0x13c/0x1d0 [ 577.628589][ T26] schedule_preempt_disabled+0x13/0x20 [ 577.634151][ T26] __mutex_lock+0x6cc/0xc60 [ 577.640540][ T26] ? pcpu_free_area+0x9c0/0xbe0 [ 577.645396][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 577.668692][ T26] ? free_percpu+0xfd/0xa20 [ 577.673219][ T26] __mutex_lock_slowpath+0xe/0x10 [ 577.699590][ T26] mutex_lock+0xdb/0xf0 [ 577.703785][ T26] ? mutex_trylock+0xa0/0xa0 [ 577.718802][ T26] ? kobject_put+0x1a8/0x270 [ 577.723541][ T26] ? put_device+0x1f/0x30 [ 577.727881][ T26] ? free_netdev+0x384/0x480 [ 577.749104][ T26] rtnl_lock+0x15/0x20 [ 577.753401][ T26] netdev_run_todo+0xb5b/0xd50 [ 577.768868][ T26] ? netdev_refcnt_read+0x1d0/0x1d0 [ 577.774302][ T26] ? netdev_state_change+0xa6/0x230 [ 577.798910][ T26] ? netdev_features_change+0x190/0x190 [ 577.804484][ T26] ? tun_chr_open+0x540/0x540 [ 577.828603][ T26] rtnl_unlock+0xe/0x10 [ 577.832786][ T26] tun_chr_close+0xc4/0x140 [ 577.837285][ T26] __fput+0x2fb/0x770 [ 577.908591][ T26] ____fput+0x15/0x20 [ 577.912644][ T26] task_work_run+0x127/0x190 [ 577.917250][ T26] exit_to_user_mode_loop+0xcb/0xe0 [ 577.938209][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 577.943705][ T26] syscall_exit_to_user_mode+0x1d/0x40 [ 577.968889][ T26] do_syscall_64+0x3d/0x40 [ 577.973366][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 577.981192][ T26] RIP: 0033:0x7f21c0882799 [ 577.985624][ T26] RSP: 002b:00007f21bf2dd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 578.019082][ T26] RAX: 0000000000000000 RBX: 00007f21c0afbfa0 RCX: 00007f21c0882799 [ 578.027303][ T26] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 578.099400][ T26] RBP: 00007f21c0918c99 R08: 0000000000000000 R09: 0000000000000000 [ 578.107416][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 578.149097][ T26] R13: 00007f21c0afc038 R14: 00007f21c0afbfa0 R15: 00007ffcf089ee38 [ 578.169194][ T26] INFO: task syz.1.6112:20878 blocked for more than 167 seconds. [ 578.176933][ T26] Tainted: G W syzkaller #0 [ 578.199325][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 578.209931][ T26] task:syz.1.6112 state:D stack: 0 pid:20878 ppid: 10556 flags:0x00004004 [ 578.238493][ T26] Call Trace: [ 578.242250][ T26] __schedule+0xb53/0x1320 [ 578.246687][ T26] ? __sched_text_start+0x8/0x8 [ 578.268690][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 578.274137][ T26] ? __kasan_check_write+0x14/0x20 [ 578.299034][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 578.304872][ T26] schedule+0x13c/0x1d0 [ 578.328658][ T26] schedule_preempt_disabled+0x13/0x20 [ 578.334248][ T26] __mutex_lock+0x6cc/0xc60 [ 578.358254][ T26] ? fput_many+0xe7/0x1a0 [ 578.362609][ T26] ? fput+0x1a/0x20 [ 578.366508][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 578.389459][ T26] ? memset+0x35/0x40 [ 578.393470][ T26] __mutex_lock_slowpath+0xe/0x10 [ 578.448650][ T26] mutex_lock+0xdb/0xf0 [ 578.452922][ T26] ? mutex_trylock+0xa0/0xa0 [ 578.457520][ T26] ? tun_chr_open+0x540/0x540 [ 578.478546][ T26] rtnl_lock+0x15/0x20 [ 578.482657][ T26] tun_chr_close+0x40/0x140 [ 578.487161][ T26] __fput+0x2fb/0x770 [ 578.509304][ T26] ____fput+0x15/0x20 [ 578.513313][ T26] task_work_run+0x127/0x190 [ 578.517903][ T26] exit_to_user_mode_loop+0xcb/0xe0 [ 578.538174][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 578.543655][ T26] syscall_exit_to_user_mode+0x1d/0x40 [ 578.579022][ T26] do_syscall_64+0x3d/0x40 [ 578.583475][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 578.608901][ T26] RIP: 0033:0x7fa828553799 [ 578.613341][ T26] RSP: 002b:00007fa826fae028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 578.639494][ T26] RAX: 0000000000000000 RBX: 00007fa8287ccfa0 RCX: 00007fa828553799 [ 578.719085][ T26] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 578.727524][ T26] RBP: 00007fa8285e9c99 R08: 0000000000000000 R09: 0000000000000000 [ 578.769143][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 578.777256][ T26] R13: 00007fa8287cd038 R14: 00007fa8287ccfa0 R15: 00007ffed807bcc8 [ 578.818373][ T26] INFO: task syz.1.6112:20892 blocked for more than 168 seconds. [ 578.826385][ T26] Tainted: G W syzkaller #0 [ 578.849271][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 578.868479][ T26] task:syz.1.6112 state:D stack: 0 pid:20892 ppid: 10556 flags:0x00004004 [ 578.877875][ T26] Call Trace: [ 578.899245][ T26] __schedule+0xb53/0x1320 [ 578.903694][ T26] ? __sched_text_start+0x8/0x8 [ 579.549502][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 579.554661][ T26] ? __kasan_check_write+0x14/0x20 [ 579.568328][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 579.574260][ T26] schedule+0x13c/0x1d0 [ 579.588292][ T26] schedule_preempt_disabled+0x13/0x20 [ 579.593855][ T26] __mutex_lock+0x6cc/0xc60 [ 579.609447][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 579.616223][ T26] __mutex_lock_slowpath+0xe/0x10 [ 579.639237][ T26] mutex_lock+0xdb/0xf0 [ 579.643417][ T26] ? mutex_trylock+0xa0/0xa0 [ 579.648012][ T26] ? full_name_hash+0xa0/0xf0 [ 579.688568][ T26] ? dev_get_by_name_rcu+0xc8/0xf0 [ 579.693718][ T26] rtnl_lock+0x15/0x20 [ 579.697793][ T26] dev_ioctl+0x542/0xb80 [ 579.718867][ T26] sock_do_ioctl+0x27b/0x380 [ 579.723571][ T26] ? sock_show_fdinfo+0xa0/0xa0 [ 579.738167][ T26] ? selinux_file_ioctl+0x3a0/0x4d0 [ 579.743564][ T26] sock_ioctl+0x4bd/0x760 [ 579.747981][ T26] ? sock_poll+0x350/0x350 [ 579.778689][ T26] ? __fget_files+0x2c4/0x320 [ 579.783401][ T26] ? security_file_ioctl+0x84/0xa0 [ 579.798354][ T26] ? sock_poll+0x350/0x350 [ 579.802781][ T26] __se_sys_ioctl+0x121/0x1a0 [ 579.807547][ T26] __x64_sys_ioctl+0x7b/0x90 [ 580.578327][ T26] do_syscall_64+0x31/0x40 [ 580.582793][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 580.599246][ T26] RIP: 0033:0x7fa828553799 [ 580.603758][ T26] RSP: 002b:00007fa826f6c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 580.628829][ T26] RAX: ffffffffffffffda RBX: 00007fa8287cd180 RCX: 00007fa828553799 [ 580.636823][ T26] RDX: 00002000000000c0 RSI: 0000000000008914 RDI: 0000000000000006 [ 580.668957][ T26] RBP: 00007fa8285e9c99 R08: 0000000000000000 R09: 0000000000000000 [ 580.676953][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 580.708673][ T26] R13: 00007fa8287cd218 R14: 00007fa8287cd180 R15: 00007ffed807bcc8 [ 580.716785][ T26] NMI backtrace for cpu 0 [ 580.722892][ T26] CPU: 0 PID: 26 Comm: khungtaskd Tainted: G W syzkaller #0 [ 580.731472][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 580.741522][ T26] Call Trace: [ 580.745158][ T26] __dump_stack+0x21/0x24 [ 580.749488][ T26] dump_stack_lvl+0x1a7/0x208 [ 580.754166][ T26] ? show_regs_print_info+0x18/0x18 [ 580.759367][ T26] ? sched_show_task+0x31c/0x480 [ 580.764391][ T26] ? __rcu_read_unlock+0xa0/0xa0 [ 580.769333][ T26] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 580.775397][ T26] dump_stack+0x15/0x1c [ 580.779554][ T26] nmi_trigger_cpumask_backtrace+0x27f/0x2c0 [ 580.785539][ T26] arch_trigger_cpumask_backtrace+0x10/0x20 [ 580.791441][ T26] watchdog+0xe2d/0xf80 [ 580.795690][ T26] ? hungtask_pm_notify+0x50/0x50 [ 580.800803][ T26] ? __kasan_check_read+0x11/0x20 [ 580.805842][ T26] ? __kthread_parkme+0xb9/0x1c0 [ 580.810819][ T26] kthread+0x346/0x3d0 [ 580.814899][ T26] ? hungtask_pm_notify+0x50/0x50 [ 580.819932][ T26] ? kthread_blkcg+0xd0/0xd0 [ 580.824528][ T26] ret_from_fork+0x1f/0x30 [ 580.830644][ T26] Sending NMI from CPU 0 to CPUs 1: [ 580.837863][ T26] NMI backtrace for cpu 1 [ 580.837870][ T26] CPU: 1 PID: 20863 Comm: syz.2.6107 Tainted: G W syzkaller #0 [ 580.837876][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 580.837880][ T26] RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x27/0x80 [ 580.837890][ T26] Code: 00 66 90 55 48 89 e5 48 8b 45 08 65 48 8b 0d e0 b5 9d 7e 65 8b 15 e5 b5 9d 7e f7 c2 00 01 ff 00 74 11 f7 c2 00 01 00 00 74 57 <83> b9 dc 0a 00 00 00 74 4e 8b 91 b8 0a 00 00 83 fa 03 75 43 48 8b [ 580.837893][ T26] RSP: 0018:ffffc9000016f470 EFLAGS: 00000006 [ 580.837901][ T26] RAX: ffffffff8100c48c RBX: ffffc9000016f4e0 RCX: ffff888127520000 [ 580.837906][ T26] RDX: 0000000080010101 RSI: ffffffff819a9b96 RDI: 0000000000000000 [ 580.837910][ T26] RBP: ffffc9000016f470 R08: ffffc9000016f501 R09: ffffc9000016f4e0 [ 580.837915][ T26] R10: dffffc0000000000 R11: fffff5200002dea8 R12: dffffc0000000000 [ 580.837919][ T26] R13: 000000000000007f R14: ffffffff819a9b96 R15: 1ffff9200002dec1 [ 580.837924][ T26] FS: 00007f85aa6fe6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 580.837928][ T26] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 580.837932][ T26] CR2: 00007faa52fc358c CR3: 0000000113577000 CR4: 00000000003506a0 [ 580.837936][ T26] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 580.837941][ T26] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 580.837943][ T26] Call Trace: [ 580.837945][ T26] [ 580.837948][ T26] perf_callchain_kernel+0x2cc/0x620 [ 580.837951][ T26] ? arch_perf_update_userpage+0x3c0/0x3c0 [ 580.837954][ T26] ? __free_pages+0x146/0x3b0 [ 580.837957][ T26] ? debug_smp_processor_id+0x17/0x20 [ 580.837961][ T26] ? get_callchain_entry+0x170/0x380 [ 580.837964][ T26] get_perf_callchain+0x356/0x460 [ 580.837967][ T26] ? put_callchain_entry+0xb0/0xb0 [ 580.837970][ T26] ? get_perf_callchain+0x391/0x460 [ 580.837973][ T26] ? __perf_event_header__init_id+0x46a/0x5a0 [ 580.837976][ T26] ? kvm_is_in_guest+0x28/0x40 [ 580.837979][ T26] perf_prepare_sample+0x34c/0x1960 [ 580.837982][ T26] ? perf_callchain+0x1c0/0x1c0 [ 580.837985][ T26] ? perf_reboot+0xf0/0xf0 [ 580.837988][ T26] perf_event_output_forward+0xd1/0x1a0 [ 580.837991][ T26] ? perf_prepare_sample+0x1960/0x1960 [ 580.837995][ T26] ? __this_cpu_preempt_check+0x13/0x20 [ 580.837998][ T26] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 580.838001][ T26] __perf_event_overflow+0x1b3/0x340 [ 580.838005][ T26] perf_swevent_hrtimer+0x40d/0x5a0 [ 580.838008][ T26] ? cpu_clock_event_read+0x50/0x50 [ 580.838011][ T26] ? cpu_clock_event_read+0x50/0x50 [ 580.838014][ T26] ? cpu_clock_event_read+0x50/0x50 [ 580.838017][ T26] __hrtimer_run_queues+0x34f/0x820 [ 580.838020][ T26] ? hrtimer_interrupt+0xdc0/0xdc0 [ 580.838023][ T26] hrtimer_interrupt+0x3a6/0xdc0 [ 580.838026][ T26] __sysvec_apic_timer_interrupt+0xfa/0x3f0 [ 580.838030][ T26] sysvec_apic_timer_interrupt+0xba/0xe0 [ 580.838033][ T26] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 580.838037][ T26] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x27/0x90 [ 580.838046][ T26] Code: 00 66 90 55 48 89 e5 48 8b 45 08 65 48 8b 15 70 b6 9d 7e 65 8b 0d 75 b6 9d 7e f7 c1 00 01 ff 00 74 11 f7 c1 00 01 00 00 74 5b <83> ba dc 0a 00 00 00 74 52 8b 8a b8 0a 00 00 83 f9 03 75 47 48 8b [ 580.838050][ T26] RSP: 0018:ffffc9000016fe78 EFLAGS: 00000206 [ 580.838056][ T26] RAX: ffffffff83fe556f RBX: 0000000000000000 RCX: 0000000080000101 [ 580.838060][ T26] RDX: ffff888127520000 RSI: 0000000000000001 RDI: 0000000000000000 [ 580.838064][ T26] RBP: ffffc9000016fe78 R08: ffffc90000170220 R09: ffffc90000170230 [ 580.838069][ T26] R10: dffffc0000000000 R11: fffff5200002e066 R12: ffff88810aefcca8 [ 580.838073][ T26] R13: 0000000000000010 R14: 0000000000000003 R15: 0000000000000001 [ 580.838076][ T26] ? rt6_score_route+0xaf/0x730 [ 580.838079][ T26] rt6_score_route+0xaf/0x730 [ 580.838083][ T26] ? __sanitizer_cov_trace_const_cmp1+0x10/0x90 [ 580.838091][ T26] find_match+0x162/0xd60 [ 580.838095][ T26] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 580.838098][ T26] ? hrtimer_forward+0x18f/0x2a0 [ 580.838100][ T26] ? ktime_get+0x10e/0x140 [ 580.838103][ T26] __find_rr_leaf+0x256/0x9e0 [ 580.838106][ T26] ? sched_clock_cpu+0x1b/0x3d0 [ 580.838109][ T26] ? cpu_clock_event_read+0x50/0x50 [ 580.838113][ T26] ? rt6_remove_exception+0x330/0x330 [ 580.838116][ T26] ? fib6_node_lookup+0x3ef/0x420 [ 580.838119][ T26] fib6_table_lookup+0x314/0xa20 [ 580.838122][ T26] ? fib6_nh_age_exceptions+0x940/0x940 [ 580.838125][ T26] ip6_pol_route+0x152/0x1170 [ 580.838129][ T26] ? fib6_table_lookup+0xa20/0xa20 [ 580.838132][ T26] ? kvm_sched_clock_read+0x18/0x40 [ 580.838135][ T26] ? debug_smp_processor_id+0x17/0x20 [ 580.838138][ T26] ip6_pol_route_input+0x56/0x80 [ 580.838141][ T26] fib6_rule_lookup+0x20a/0x5d0 [ 580.838144][ T26] ? ip6_route_input_lookup+0xd0/0xd0 [ 580.838147][ T26] ? fib6_lookup+0x2c0/0x2c0 [ 580.838150][ T26] ? __ipv6_addr_type+0x4d/0x2f0 [ 580.838154][ T26] ? __sanitizer_cov_trace_switch+0x52/0xe0 [ 580.838156][ T26] ip6_route_input+0x628/0x840 [ 580.838160][ T26] ? ip6_multipath_l3_keys+0x5d0/0x5d0 [ 580.838163][ T26] ? ip6table_raw_hook+0x6a/0x80 [ 580.838166][ T26] ? ip6table_mangle_net_exit+0x80/0x80 [ 580.838169][ T26] ip6_rcv_finish+0x155/0x360 [ 580.838171][ T26] ipv6_rcv+0xf0/0x230 [ 580.838174][ T26] ? __kernfs_create_file+0x4e/0x270 [ 580.838177][ T26] ? sysfs_add_file_mode_ns+0x29a/0x350 [ 580.838180][ T26] ? ip6_rcv_finish+0x360/0x360 [ 580.838183][ T26] ? register_netdevice+0xdf0/0x13e0 [ 580.838185][ T26] ? refcount_add+0x80/0x80 [ 580.838188][ T26] ? dev_queue_xmit+0x17/0x20 [ 580.838192][ T26] ? br_dev_queue_push_xmit+0x531/0x6b0 [ 580.838194][ T26] ? memcpy+0x56/0x70 [ 580.838197][ T26] ? ip6_rcv_finish+0x360/0x360 [ 580.838200][ T26] __netif_receive_skb+0xc8/0x280 [ 580.838203][ T26] netif_receive_skb+0x9b/0x3f0 [ 580.838206][ T26] ? netif_receive_skb_core+0x100/0x100 [ 580.838209][ T26] ? __br_forward+0x208/0x2f0 [ 580.838212][ T26] ? br_flood+0x3cc/0x420 [ 580.838215][ T26] br_pass_frame_up+0x164/0x1e0 [ 580.838218][ T26] br_handle_frame_finish+0xd55/0x11a0 [ 580.838221][ T26] ? brport_get_ownership+0x80/0x80 [ 580.838224][ T26] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 580.838227][ T26] br_handle_frame+0x407/0x8e0 [ 580.838230][ T26] ? br_get_rx_handler+0x20/0x20 [ 580.838233][ T26] __netif_receive_skb_core+0xed9/0x3080 [ 580.838236][ T26] ? kfree_skb+0xc1/0x2f0 [ 580.838239][ T26] ? set_rps_cpu+0x5d0/0x5d0 [ 580.838241][ T26] ? ipv6_rcv+0xf0/0x230 [ 580.838244][ T26] ? ip6_rcv_finish+0x360/0x360 [ 580.838247][ T26] ? refcount_add+0x80/0x80 [ 580.838250][ T26] ? irq_exit_rcu+0x9/0x10 [ 580.838253][ T26] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 580.838257][ T26] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 580.838260][ T26] __netif_receive_skb+0x72/0x280 [ 580.838264][ T26] process_backlog+0x368/0x600 [ 580.838266][ T26] net_rx_action+0x44d/0xe00 [ 580.838269][ T26] ? __irq_exit_rcu+0x40/0x150 [ 580.838272][ T26] ? net_tx_action+0x530/0x530 [ 580.838275][ T26] __do_softirq+0x255/0x563 [ 580.838278][ T26] asm_call_irq_on_stack+0xf/0x20 [ 580.838280][ T26] [ 580.838283][ T26] do_softirq_own_stack+0x60/0x80 [ 580.838286][ T26] __irq_exit_rcu+0x128/0x150 [ 580.838289][ T26] irq_exit_rcu+0x9/0x10 [ 580.838292][ T26] sysvec_apic_timer_interrupt+0xbf/0xe0 [ 580.838295][ T26] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 580.838299][ T26] RIP: 0010:finish_task_switch+0x140/0x5a0 [ 580.838308][ T26] Code: 84 c0 0f 85 b1 01 00 00 41 c7 45 00 00 00 00 00 4c 89 e7 e8 72 a5 3d 03 4d 8d af b8 0a 00 00 4c 89 e8 48 c1 e8 03 0f b6 04 18 <84> c0 0f 85 a5 01 00 00 41 80 65 03 bf 0f 1f 44 00 00 4d 85 f6 74 [ 580.838312][ T26] RSP: 0018:ffffc900015c65c0 EFLAGS: 00000a02 [ 580.838318][ T26] RAX: 0000000000000000 RBX: dffffc0000000000 RCX: 0000000000000000 [ 580.838322][ T26] RDX: 0000000040000002 RSI: 0000000000000000 RDI: 00000000ffffffff [ 580.838326][ T26] RBP: ffffc900015c6610 R08: ffffffff86c37c53 R09: 1ffffffff0d86f8a [ 580.838331][ T26] R10: dffffc0000000000 R11: fffffbfff0d86f8b R12: ffff8881f7155fc0 [ 580.838335][ T26] R13: ffff888127520ab8 R14: ffff88810c5ed400 R15: ffff888127520000 [ 580.838338][ T26] ? __switch_to_asm+0x34/0x60 [ 580.838341][ T26] __schedule+0xb5b/0x1320 [ 580.838344][ T26] ? __sched_text_start+0x8/0x8 [ 580.838347][ T26] ? kvm_sched_clock_read+0x18/0x40 [ 580.838349][ T26] ? sched_clock+0x3a/0x40 [ 580.838352][ T26] ? sched_clock_cpu+0x1b/0x3d0 [ 580.838355][ T26] preempt_schedule_irq+0xaa/0x120 [ 580.838358][ T26] ? preempt_schedule_notrace+0x120/0x120 [ 580.838361][ T26] ? __irq_exit_rcu+0x40/0x150 [ 580.838364][ T26] irqentry_exit+0x56/0x60 [ 580.838367][ T26] sysvec_apic_timer_interrupt+0xcb/0xe0 [ 580.838371][ T26] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 580.838374][ T26] RIP: 0010:unwind_next_frame+0xe3/0x700 [ 580.838384][ T26] Code: 00 48 ba 00 00 00 00 00 fc ff df 4c 89 6d c0 4c 89 7d b8 4c 89 75 d0 4c 8b 7b 38 4c 8d 73 28 4c 89 f0 48 c1 e8 03 48 89 45 a0 <80> 3c 10 00 74 12 4c 89 f7 e8 df 05 70 00 48 ba 00 00 00 00 00 fc [ 580.838387][ T26] RSP: 0018:ffffc900015c6890 EFLAGS: 00000a06 [ 580.838393][ T26] RAX: 1ffff920002b8d36 RBX: ffffc900015c6988 RCX: 1ffff920002b8d38 [ 580.838398][ T26] RDX: dffffc0000000000 RSI: 1ffff920002b8d32 RDI: ffffc900015c6988 [ 580.838402][ T26] RBP: ffffc900015c6900 R08: ffffc900015c6901 R09: ffffc900015c6988 [ 580.838407][ T26] R10: dffffc0000000000 R11: fffff520002b8d3d R12: 0000000000000000 [ 580.838411][ T26] R13: 1ffff920002b8d3c R14: ffffc900015c69b0 R15: ffffc900015c6978 [ 580.838414][ T26] __unwind_start+0x31f/0x3a0 [ 580.838417][ T26] ? stack_trace_save+0xf0/0xf0 [ 580.838420][ T26] arch_stack_walk+0xd6/0x140 [ 580.838423][ T26] ? arch_stack_walk+0xd6/0x140 [ 580.838426][ T26] stack_trace_save+0xa6/0xf0 [ 580.838429][ T26] ? stack_trace_snprint+0xf0/0xf0 [ 580.838432][ T26] ? kasan_check_range+0x89/0x2a0 [ 580.838434][ T26] ? memset+0x35/0x40 [ 580.838437][ T26] save_stack+0xc1/0x230 [ 580.838440][ T26] ? __reset_page_owner+0x140/0x140 [ 580.838443][ T26] ? sched_clock_cpu+0x1b/0x3d0 [ 580.838446][ T26] ? __sanitizer_cov_trace_pc+0x45/0x60 [ 580.838449][ T26] __reset_page_owner+0x35/0x140 [ 580.838452][ T26] free_unref_page_prepare+0x2b7/0x2d0 [ 580.838455][ T26] __free_pages+0x146/0x3b0 [ 580.838458][ T26] ? preempt_schedule+0xbc/0xd0 [ 580.838461][ T26] ? clear_zone_contiguous+0x50/0x50 [ 580.838465][ T26] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 580.838467][ T26] __free_slab+0xcf/0x190 [ 580.838470][ T26] discard_slab+0x29/0x40 [ 580.838473][ T26] __slab_free+0x313/0x3a0 [ 580.838475][ T26] ? irq_exit_rcu+0x9/0x10 [ 580.838479][ T26] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 580.838482][ T26] ? qlink_free+0x3e/0x90 [ 580.838484][ T26] ___cache_free+0x10e/0x130 [ 580.838487][ T26] qlink_free+0x50/0x90 [ 580.838489][ T26] qlist_free_all+0x5f/0xb0 [ 580.838493][ T26] kasan_quarantine_reduce+0x14a/0x160 [ 580.838496][ T26] __kasan_slab_alloc+0x2f/0xf0 [ 580.838499][ T26] ? __kasan_check_write+0x14/0x20 [ 580.838502][ T26] ? finish_task_switch+0x1b7/0x5a0 [ 580.838505][ T26] ? switch_mm_irqs_off+0x75f/0x990 [ 580.838513][ T26] ? __switch_to_asm+0x34/0x60 [ 580.838516][ T26] ? __schedule+0xb5b/0x1320 [ 580.838519][ T26] ? __sched_text_start+0x8/0x8 [ 580.838522][ T26] ? kvm_sched_clock_read+0x18/0x40 [ 580.838525][ T26] ? __kasan_check_read+0x11/0x20 [ 580.838528][ T26] ? preempt_schedule_irq+0xca/0x120 [ 580.838532][ T26] ? preempt_schedule_notrace+0x120/0x120 [ 580.838535][ T26] ? __irq_exit_rcu+0x40/0x150 [ 580.838537][ T26] slab_post_alloc_hook+0x5d/0x2f0 [ 580.838540][ T26] ? __kernfs_new_node+0xe3/0x6b0 [ 580.838543][ T26] ? __kernfs_new_node+0xe3/0x6b0 [ 580.838546][ T26] kmem_cache_alloc+0x162/0x2d0 [ 580.838549][ T26] ? __kernfs_new_node+0xe3/0x6b0 [ 580.838552][ T26] __kernfs_new_node+0xe3/0x6b0 [ 580.838556][ T26] ? preempt_schedule_notrace+0x120/0x120 [ 580.838559][ T26] ? kernfs_new_node+0x260/0x260 [ 580.838561][ T26] ? irqentry_exit+0x56/0x60 [ 580.838565][ T26] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 580.838568][ T26] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 580.838571][ T26] kernfs_new_node+0x150/0x260 [ 580.838574][ T26] __kernfs_create_file+0x4e/0x270 [ 580.838577][ T26] sysfs_add_file_mode_ns+0x29a/0x350 [ 580.838580][ T26] internal_create_group+0x495/0xd00 [ 580.838583][ T26] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 580.838586][ T26] ? sysfs_create_group+0x30/0x30 [ 580.838589][ T26] sysfs_create_groups+0x58/0x120 [ 580.838592][ T26] device_add_attrs+0x155/0x430 [ 580.838596][ T26] ? device_add_class_symlinks+0x27e/0x2c0 [ 580.838598][ T26] device_add+0x504/0xc10 [ 580.838601][ T26] ? device_initialize+0x1e1/0x420 [ 580.838604][ T26] netdev_register_kobject+0x1bc/0x360 [ 580.838607][ T26] ? raw_notifier_call_chain+0xe9/0x100 [ 580.838610][ T26] register_netdevice+0xdf0/0x13e0 [ 580.838613][ T26] ? irq_exit_rcu+0x9/0x10 [ 580.838617][ T26] ? netif_stacked_transfer_operstate+0x220/0x220 [ 580.838619][ T26] ? alloc_netdev_mqs+0xa40/0xc80 [ 580.838622][ T26] register_netdev+0x3e/0x50 [ 580.838625][ T26] sit_init_net+0x246/0x480 [ 580.838628][ T26] ? ops_init+0x89/0x4a0 [ 580.838630][ T26] ops_init+0x1ba/0x4a0 [ 580.838633][ T26] ? setup_net+0x3ba/0xb60 [ 580.838636][ T26] setup_net+0x376/0xb60 [ 580.838639][ T26] ? copy_net_ns+0x520/0x520 [ 580.838642][ T26] ? __kasan_check_write+0x14/0x20 [ 580.838644][ T26] copy_net_ns+0x314/0x520 [ 580.838647][ T26] create_new_namespaces+0x3a2/0x650 [ 580.838650][ T26] copy_namespaces+0x1d1/0x220 [ 580.838653][ T26] ? copy_signal+0x4cb/0x600 [ 580.838655][ T26] copy_process+0x11d3/0x3300 [ 580.838658][ T26] ? irq_exit_rcu+0x9/0x10 [ 580.838661][ T26] ? __pidfd_prepare+0x150/0x150 [ 580.838664][ T26] ? kernel_clone+0x133/0x960 [ 580.838667][ T26] kernel_clone+0x233/0x960 [ 580.838670][ T26] ? create_io_thread+0x170/0x170 [ 580.838673][ T26] ? kvm_sched_clock_read+0x18/0x40 [ 580.838675][ T26] ? sched_clock+0x3a/0x40 [ 580.838678][ T26] ? sched_clock_cpu+0x1b/0x3d0 [ 580.838681][ T26] __x64_sys_clone+0x198/0x210 [ 580.838684][ T26] ? __ia32_sys_vfork+0x130/0x130 [ 580.838687][ T26] ? switch_fpu_return+0x19c/0x330 [ 580.838690][ T26] ? __kasan_check_read+0x11/0x20 [ 580.838693][ T26] ? exit_to_user_mode_prepare+0x9a/0xa0 [ 580.838696][ T26] do_syscall_64+0x31/0x40 [ 580.838700][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 580.838702][ T26] RIP: 0033:0x7f85abcc4799 [ 580.838712][ T26] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 580.838716][ T26] RSP: 002b:00007f85aa6fdfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 580.838723][ T26] RAX: ffffffffffffffda RBX: 00007f85abf3e090 RCX: 00007f85abcc4799 [ 580.838727][ T26] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042164000 [ 580.838732][ T26] RBP: 00007f85abd5ac99 R08: 0000000000000000 R09: 0000000000000000 [ 580.838736][ T26] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 580.838740][ T26] R13: 00007f85abf3e128 R14: 00007f85abf3e090 R15: 00007ffe12b07728 [ 581.988633][ C1] net_ratelimit: 49087 callbacks suppressed [ 581.988684][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 581.992821][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 581.999224][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 582.003465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.008632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 582.014307][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 582.021293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 582.025409][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.031153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 582.035958][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.998114][ C1] net_ratelimit: 80491 callbacks suppressed [ 586.998127][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 587.000480][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 587.004308][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 587.017438][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 587.028685][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 587.028737][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 587.028785][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 587.028836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 587.028895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 587.042792][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.008131][ C1] net_ratelimit: 112759 callbacks suppressed [ 592.008144][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 592.008195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.014338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 592.014388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 592.027737][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.038437][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 592.052977][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.062768][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 592.075480][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.086937][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 597.018130][ C0] net_ratelimit: 69032 callbacks suppressed [ 597.018144][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.019041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 597.024113][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.037360][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 597.048345][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.061440][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 597.072294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.085300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 597.096377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.109379][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 602.028117][ C0] net_ratelimit: 69174 callbacks suppressed [ 602.028130][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.029421][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 602.034101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.046270][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 602.058450][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.070279][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 602.082351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.094228][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 602.106412][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.118570][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 607.038120][ C1] net_ratelimit: 110947 callbacks suppressed [ 607.038133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 607.040552][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.044347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 607.059136][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.068407][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 607.083932][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.092483][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 607.105692][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.116467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 607.129690][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.048140][ C1] net_ratelimit: 112384 callbacks suppressed [ 612.048153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 612.048161][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.054300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 612.054351][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 612.054405][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 612.067879][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.078540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 612.078592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 612.078641][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 612.078691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 617.058122][ C1] net_ratelimit: 112717 callbacks suppressed [ 617.058137][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 617.061619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.064203][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 617.064259][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 617.064315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 617.064366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 617.077837][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.088274][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 617.104238][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.112616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 622.068162][ C0] net_ratelimit: 63799 callbacks suppressed [ 622.068175][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.069017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 622.074255][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.074361][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.087294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 622.098401][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.098461][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.098524][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.098659][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.098722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.078117][ C0] net_ratelimit: 102179 callbacks suppressed [ 627.078131][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 627.078178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 627.084243][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.097889][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 627.108305][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.121879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 627.138242][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.146891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 627.157347][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 627.157400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.088123][ C1] net_ratelimit: 102564 callbacks suppressed [ 632.088135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 632.088247][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.094204][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 632.110449][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.118509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 632.132009][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.142563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 632.159240][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 632.166967][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 632.180369][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 637.098137][ C0] net_ratelimit: 106179 callbacks suppressed [ 637.098151][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 637.099126][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 637.104223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 637.117635][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 637.128166][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 637.141706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 637.152362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 637.152431][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 637.152553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 637.152592][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 642.108101][ C1] net_ratelimit: 68298 callbacks suppressed [ 642.108115][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 642.108144][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 642.114183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 642.127040][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 642.138096][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 642.151633][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 642.162070][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 642.178065][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 642.186075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 642.201132][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 647.118133][ C1] net_ratelimit: 110660 callbacks suppressed [ 647.118146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 647.119143][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 647.124224][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 647.124281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 647.140463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 647.148415][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 647.163519][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 647.172463][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 647.185801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 647.196557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 652.128087][ C1] net_ratelimit: 112721 callbacks suppressed [ 652.128100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 652.131071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 652.134177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 652.150010][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 652.168138][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 652.174664][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 652.182395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 652.196032][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 652.206383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 652.219649][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 657.138111][ C1] net_ratelimit: 112071 callbacks suppressed [ 657.138125][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 657.139029][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 657.144358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 657.144416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 657.144467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 657.144517][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 657.144566][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 657.144616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 657.144665][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 657.144727][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 662.148115][ C1] net_ratelimit: 112852 callbacks suppressed [ 662.148130][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 662.148937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 662.154320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 662.167445][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 662.178328][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 662.191564][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 662.202599][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 662.215745][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 662.226709][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 662.241947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 667.158137][ C0] net_ratelimit: 86862 callbacks suppressed [ 667.158149][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 667.158218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 667.164268][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 667.164315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 667.164468][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 667.164527][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 667.164590][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 667.178168][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 667.188510][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 667.203303][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 672.168106][ C1] net_ratelimit: 84251 callbacks suppressed [ 672.168119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 672.168749][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 672.174180][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 672.174231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 672.174280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 672.174337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 672.174386][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 672.174436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 672.174485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 672.174535][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 677.178090][ C0] net_ratelimit: 92091 callbacks suppressed [ 677.178104][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 677.179189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 677.184148][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 677.184186][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 677.184263][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 677.199243][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 677.208972][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 677.222397][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 677.233018][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 677.246297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 682.188116][ C1] net_ratelimit: 110357 callbacks suppressed [ 682.188129][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 682.189820][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 682.194297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 682.207028][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.218548][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 682.232119][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 682.242590][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 682.242654][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 682.257715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 682.266791][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 687.198110][ C1] net_ratelimit: 99491 callbacks suppressed [ 687.198123][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 687.199534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.204338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 687.217702][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.228432][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 687.241442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 687.252644][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 687.265695][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.277076][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 687.291694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 692.208082][ C0] net_ratelimit: 81417 callbacks suppressed [ 692.208095][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.209920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 692.214202][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 692.228099][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 692.238278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 692.274450][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 692.286552][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 692.298785][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 692.310825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.312819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 697.218083][ C0] net_ratelimit: 70777 callbacks suppressed [ 697.218097][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 697.219359][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 697.224154][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.238482][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 697.248403][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 697.261679][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 697.272497][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.285739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 697.296836][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.310321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 702.228070][ C1] net_ratelimit: 107225 callbacks suppressed [ 702.228083][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 702.228701][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 702.234143][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 702.249201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 702.258231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 702.258288][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 702.258337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 702.258387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 702.258437][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 702.258498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 707.238092][ C1] net_ratelimit: 76152 callbacks suppressed [ 707.238106][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 707.238220][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 707.244278][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 707.257660][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 707.268371][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 707.281700][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 707.292375][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 707.306330][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 707.316449][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:60:7e:8e:db:e6, vlan:0) [ 707.334381][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)