last executing test programs: 32.978501651s ago: executing program 1 (id=649): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080", @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r2], 0x48) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1600000000000000b40000007f00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000b0000000000000000000000e4ff0000"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @generic={0x79, 0x0, 0x0, 0x258}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)=@generic={&(0x7f00000002c0)='./file0\x00', r0}, 0x18) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 32.905040237s ago: executing program 1 (id=654): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x40000003ff, 0x32e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0x3, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000), 0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x7, 0x2, &(0x7f00000002c0)=@raw=[@btf_id={0x18, 0x3, 0x3, 0x0, 0x4}], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x4e, &(0x7f0000000440)=""/78, 0x41000, 0x10, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x8}, 0x10, 0xffffffffffffffff, r2, 0x5, &(0x7f00000007c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10], &(0x7f0000000800)=[{0x4, 0x3, 0x3, 0x2}, {0x2, 0x5, 0xb, 0xa}, {0x0, 0x2, 0x9, 0x2}, {0x1, 0x2, 0x7, 0xa}, {0x3, 0x4, 0xb, 0x9}], 0x10, 0x8}, 0x94) close(r4) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) recvmsg$unix(r11, 0x0, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247931b3c139b7fa61e4af791a289f6f3f4e63a92f6a1f5") perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000000fec, 0x4}, 0x100000, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2fb6}, r1, 0x0, r0, 0xb) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x5, 0x3, 0x80, 0x8, 0x0, 0x9ec, 0x2, 0xd, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x80000, 0x7, 0x4, 0x0, 0x10000, 0x6, 0x7fff, 0x0, 0x10000, 0x0, 0x1}, 0xffffffffffffffff, 0x6, r0, 0xa) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mm_page_alloc\x00', r13}, 0x18) 32.316178944s ago: executing program 2 (id=664): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="160a0000000000006311180000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000200000000899b0a5cb27bc0dea74376badabebee2b61de0", @ANYRES32=0x0, @ANYRES32=0x0], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0x2}], 0x1}, 0x20000801) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r4}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="12000000610000000800000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r5}, &(0x7f0000001d80), &(0x7f0000001d40)=r3}, 0x20) recvmsg$unix(r3, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000880)=""/149, 0x95}], 0x1}, 0x41c1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdf, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0x1e, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0xa, 0x5, 0x7, 0x80, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x10}, @alu={0x4, 0x1, 0x0, 0xb, 0xb, 0x80}, @exit, @map_idx={0x18, 0x8, 0x5, 0x0, 0x9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fffffff}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x4}], 0x0, 0x2c00, 0xea, &(0x7f00000001c0)=""/234, 0x41000, 0x60, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0x3, 0x4, 0x2}, 0x10, 0x24332, 0xffffffffffffffff, 0x0, &(0x7f00000006c0), 0x0, 0x10, 0x3e}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="18504966712c6945cf0b90b2890000000000080000000000ff77a39b55b7781e640000008500000013000000c581e6187f625281dd4eab74a027426a203fa55b3c8389d2db24000e59349f93cb478dcf4de07a28d4e775b76eabdd3fcd238f01093ef660e6c3ba0bdef80f1db00824d1d0285d8d04bd3025b1f3098c646142015069a8fa2fd29f9206fa77154accb90aef66e301d5875e81"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x14}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='spi_message_done\x00', r8}, 0x18) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r7, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd637243"], 0xe) close(r9) 31.941957454s ago: executing program 1 (id=668): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x5, 0x0, 0x0, 0x6bff}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000002000000000000000100000400000000000000900b62a0975212d3000000000000000009030000000000000000000004000000000000"], 0x0, 0x4a}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071104a00000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x5c, 0x0, 0x41100, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0xfffffe84) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f0000000180)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0x3, &(0x7f00000003c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000500), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="11000000001000"/20, @ANYRES32=0x1, @ANYBLOB="0500"/20, @ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="01000000000000000500"/28], 0x50) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x50) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'hsr0\x00', 0x20}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRESHEX=r2, @ANYRES32=r5, @ANYRESOCT], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000400000088"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000401f000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800001a0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 28.782841898s ago: executing program 2 (id=675): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r7}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r9}, 0x10) write$cgroup_int(r8, &(0x7f0000000200), 0x43451) 26.937883306s ago: executing program 2 (id=681): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, 0x0, &(0x7f0000000200)=""/166}, 0x20) r5 = perf_event_open$cgroup(&(0x7f0000000640)={0x3, 0x80, 0x73, 0x9, 0xb, 0x4, 0x0, 0x40, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4702, 0x2, @perf_bp={0x0}, 0x4, 0x1, 0x5, 0x6, 0x6ce, 0x5, 0x6, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, r5, 0x1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x1ad, 0x70002, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xfffffffffffffffd}, 0x0, 0x2, 0x0, 0x2, 0x0, 0xffff0000, 0x0, 0x0, 0x1fc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) write$cgroup_pid(r7, &(0x7f0000000100), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x20e}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x6a10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x850, 0x4, 0x0, 0x0, 0x0, 0xffff2000, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) 26.732883202s ago: executing program 3 (id=683): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x81, 0xff, 0x8, 0x0, 0x5, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000180), 0x4}, 0x114068, 0x2, 0x3, 0x2, 0xd, 0x1, 0x1, 0x0, 0x47f, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/18, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={&(0x7f00000004c0)="0a2c3ffcf8bd15804492f2308be447be790b3a2f16c119a46dc6b685283b09fee0eeb0fb36cb9b6130c58c42317fb89ed0ce198b9f6b18bb3f8b0a01b58dfab5eb2ae7eba18324df4d4a930a4d", &(0x7f0000000540)=""/111, &(0x7f00000005c0)="620c5f59fee13fd742d5096d06bb3631dc28bb7bca8459284b5041f49d3de1e07417b96aaf29f6287c6197b0cccfbb6da7d3a960f0c2a1ae1e02aa125fd4e4eca64ef417220af7b434d527a2f796beb16545f46d20113f0d50160144e9fee2061b1fb16b400f5468c54793b8cbf4043d7208", &(0x7f0000000640)="5cf2b7d9a9f1d4e1a84b7bd001854616d370ab17b82c25025530d36f98d8494b274fe03a383d253a757ff7d44e76614558091e0475777e352f40648578a4cd313ba42c1d74a2cb44fbdaf7606c2f9b891a64e8a37f66086671e2aa3c81e4c50e098ec96641087aac191549066fc7613bc490e5a1d74e9229c4697ac0c1bcf13dad8d390bb92bc393baccc2974dc69f5887a890ce6dffee7202af7c2e06270ac7d76f5dc49aa291a5b472a77e8a711ca8635a1567fe0c5873beae3fa0f84fb77318adf116876ebc4a759ef19252b5d1f8", 0x1000, 0x1}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000740)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x80, 0x0, 0x0, 0x10000003, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) write$cgroup_devices(r4, &(0x7f00000001c0)=ANY=[@ANYRES8=r5, @ANYRES32=r5], 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 26.38851116s ago: executing program 2 (id=684): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00q\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb376}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0xc8, 0xfffffffe, 0x2, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00'}, 0x10) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r6, 0x0, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 25.961157864s ago: executing program 2 (id=685): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r0, 0x0, 0x200000}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0900000004000000e27f000001000000000000007a6adf625b89799028d9ca0b464eb2e0a24774ce510280b3547727a6a7438c817b53c32490466a89", @ANYRES32, @ANYBLOB="ff0f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYRESOCT=r1], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r2}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000c1a4f29c0000000600000085000000500000009500000025fab806c087e0dc84c5f6a110433ee03f190cf489d65cae60ec149985faee7e552360aefc461a16218e4c5ef3af0937ca1d8a500e7dae51e5e46e05c81aec3436b29d8b4b0dde944874f4947e491bbb92400e80b5cc6955c01371ec4851a5e8720908959f0e82facc312bd4a65b1c9f02d6042fce9e110197090a32da776e7b68268686fc6c3b09188c3ae3d4ae9d1e41510b5a6c59844a5bf4f669"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r4, @ANYBLOB], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xe, 0x5, &(0x7f0000000700)=ANY=[@ANYRES8=r6, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 25.848038104s ago: executing program 4 (id=687): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071105e00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x946}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="007065060fd05c65c25900f288a84a4788"], 0xfdef) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000080)='cgroup.max.descendants\x00', 0x2, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000001480)=ANY=[@ANYBLOB="180000000000000000000000000000007910c0000000060000000000000090c765000000083614a81784ad6dcb5128c8b200a7c68d21d26443ff6e326b63f48e032086a80c9e3a3257537a78fdc3ce9e89bbbc5ecb48e24d88dbbe50a80c2cea525ddf01565bfa172a6e373c57160e3acf62f5e6c4b5167e3f1c732361adc2e542aaeba32b0f24ac3386b3ae70285f1f5c3b3a982bcf7907000000ae1f425677d7e7033838165164925132bf9da0c92103c523f14d65eb41fcc847c55ec4d3a830"], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148}, 0x80) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB='-7'], 0x9) 25.755120031s ago: executing program 3 (id=688): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='rxrpc_connect_call\x00', r1, 0x0, 0x1000}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r8}, &(0x7f0000000540), &(0x7f0000000580)=r9}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000002ffffff8100000081"], 0x50) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x15) 25.666432728s ago: executing program 4 (id=689): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000d00)='kfree\x00', r0}, 0x10) (async, rerun: 32) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="0000000000000000b708000000002d007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000002c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8020, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async, rerun: 64) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0xfffffffffffffffd, 0x4}, 0x0, 0x6, 0x7, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}, @const]}}, &(0x7f00000005c0)=""/215, 0x3e, 0xd7, 0x1}, 0x28) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_clone(0x100000, &(0x7f00000002c0)="dd975dca5adc36df0518ab8b2bd92ae5cece12781c8aa038310e1c517e043a07aa8f99b870a59916e5a2fb7e7d264d96383d342dbbc1c5340ac557c78591db8044118c968b02aaf1eebf529a05ea2ce0a0b823b6b32ac19c05e0b99862eea0cd5f12270cf4b2c3c940981f9516681cb0e698ccab539da917a69c50c8b3b3dda41f5d54a6250b5e9fe8aa4848c2428ad67be215ed87039402be91b5ca3c717b93336ca12b9298b4cb084b907e37cc2ec645c53a3ba61e7a9affc069cb994cb9d94eb71c3bd474a9c1a3ddec93ae4645c16b8358ea7650f7c0e5de", 0xda, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000140)="f0458a5cf62c268e2ec70dcf8f9d3d0b6a7b80ffa87f6c5b5da1cbbdd5b851d10a6f9ba270e8a1ef53ff680ab852444212b96a55a7456be2a9d6ce349e39ca38256fdd24944745459a41f56e8e8a741321f74734f9aa491f06e4db8b286208") setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000cc0), 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x3, 0x8, &(0x7f0000000bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r8, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc1, &(0x7f00000005c0), 0x0, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x36, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={0xffffffffffffffff, 0x3}, 0xc) 25.63591816s ago: executing program 3 (id=690): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={r1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000011c0)={{r1, 0xffffffffffffffff}, &(0x7f0000001140), &(0x7f0000001180)=r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x18, 0x22, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ldst={0x3, 0x1, 0x2, 0x7, 0xa, 0xffffffffffffffff, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x4}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0xf36a, 0x1000, &(0x7f0000001b40)=""/4096, 0x0, 0x20, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xb, 0x7, 0x10}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001200)=[r1, r1, r1, r1, r4, r5, r1], &(0x7f0000001240)=[{0x2, 0x3, 0xf, 0x4}, {0x1, 0x3, 0x9, 0x2}, {0x0, 0x3, 0x9}, {0x4, 0x5, 0x7, 0xc}, {0x5, 0x5, 0x5, 0x4}, {0x1, 0x2, 0x1}, {0x1, 0x2, 0x4, 0x1}, {0x2, 0x1, 0x4, 0x1}, {0x1, 0x2, 0x7, 0xc}, {0x5, 0x5, 0x0, 0x4}], 0x10, 0x80000000}, 0x94) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) (rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 25.470998544s ago: executing program 4 (id=691): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000300)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r1}, 0x4) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff003, 0x4, 0x7f, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r3, &(0x7f0000001600), 0x0}, 0x20) (async) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r2, 0x18000000000002a0, 0x36, 0x0, &(0x7f00000005c0)="b9ff03076003008cb89e08f086dda253e4ccc7ba55fcaf90a177d64e30a24c63fb40a8a952e62f310bdb5579151eb81e3b334611947e", 0x0, 0xfe2, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 25.470106574s ago: executing program 3 (id=692): unlink(&(0x7f0000000000)='./file0\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x20, &(0x7f0000000500)={&(0x7f00000003c0)=""/175, 0xaf, 0x0, &(0x7f0000000480)=""/126, 0x7e}}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0xb, &(0x7f0000000580)=@raw=[@ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}], &(0x7f0000000600)='syzkaller\x00', 0xa, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x8, 0x5, 0xfffffffd}, 0x10, 0x218bd, 0xffffffffffffffff, 0x2, 0x0, &(0x7f00000006c0)=[{0x1, 0x5, 0x3, 0x5}, {0x2, 0x1, 0x1, 0x8}], 0x10, 0xffffff00}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000840)={{0x1, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1e, 0x1e, &(0x7f0000000140)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], &(0x7f0000000240)='syzkaller\x00', 0xd0, 0x5a, &(0x7f0000000280)=""/90, 0x41100, 0x46, '\x00', 0x0, @fallback=0xd, r2, 0x8, &(0x7f0000000340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0xe, 0xee7f, 0xe}, 0x10, r3, r4, 0x2, &(0x7f0000000880)=[r5], &(0x7f00000008c0)=[{0x5, 0x4, 0x1, 0x9}, {0x5, 0x2, 0x3, 0x4}], 0x10, 0x8}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r5, 0x2, 0x0, 0x9, &(0x7f00000009c0)=[0x0], 0x1, 0x0, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@fallback=r0, r4, 0x20, 0x4, 0x0, @void, @value=r4, @void, @void, r6}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b80)=@o_path={&(0x7f0000000b40)='./file0\x00', 0x0, 0x4008, r1}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c40)={r1, 0x58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0x8, 0x1, 0x8000, 0x505, 0x801, r0, 0x8, '\x00', r7, r2, 0x0, 0x4, 0x5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d80)={r1, 0x58, &(0x7f0000000d00)}, 0x10) mkdir(&(0x7f0000000dc0)='./file0\x00', 0xd4) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001f80)={&(0x7f0000000e00)="abe41ccd701e4c136558e2aacbd4161d38d7be81274dbec1685c2e7d050cad0d470ce538", &(0x7f0000000e40)=""/159, &(0x7f0000000f00)="50abb804ca9a0fdf4766721a19cf884dfe67d38805dbd2c6937de49601906afd5bb95a88115552c08bf86782ec4eca2073ce948626771c08a48b42b4f2159961b1d0a5db94bbcae9239d70cf93cc7c4592c5c682", &(0x7f0000000f80)="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", 0x644, r1, 0x4}, 0x38) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001fc0)={'caif0\x00', 0x10}) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002000)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000002040)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r8, 0x800454dd, &(0x7f0000002080)) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f00000020c0)=0x8) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000002100)={'vlan1\x00', 0x20}) r10 = getpid() r11 = perf_event_open(&(0x7f0000002240)={0x4, 0x80, 0x3, 0x7, 0x6, 0x0, 0x0, 0x8000, 0x20400, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x555, 0x2, @perf_bp={&(0x7f0000002200)}, 0x2, 0x6, 0x0, 0x2, 0x820, 0x101, 0x5, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0xc, r9, 0x3) perf_event_open(&(0x7f0000002180)={0x3, 0x80, 0x6, 0x0, 0x9, 0x4, 0x0, 0x10, 0x40000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x401, 0x2, @perf_bp={&(0x7f0000002140), 0x1}, 0x8200, 0x8, 0x7, 0x1, 0x7fffffffffffffff, 0x5, 0x4, 0x0, 0x7, 0x0, 0x9}, r10, 0x5, r11, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002300)={&(0x7f00000022c0)='f2fs_get_victim\x00', r9, 0x0, 0x75}, 0x18) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000002340), 0x0, 0x0) ioctl$TUNGETIFF(r12, 0x800454d2, &(0x7f0000002380)={'macvtap0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002680)={r8, 0xe0, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000023c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000002400)=[0x0, 0x0], &(0x7f0000002440)=[0x0], 0x0, 0xd4, &(0x7f0000002480)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000024c0), &(0x7f0000002500), 0x8, 0xab, 0x8, 0x8, &(0x7f0000002540)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000026c0)={0x1b, 0x0, 0x0, 0x200, 0x0, 0x1, 0x5, '\x00', r13, r8, 0x4, 0x2}, 0x50) 25.375330681s ago: executing program 3 (id=693): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="090000000a000000b71d000040"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000001600)={r1, &(0x7f0000000580), 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r2}, 0x10) unlink(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000630114000000696a66e91ea93f4f06b2"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13}, 0x80) (async) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000630114000000696a66e91ea93f4f06b2"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x3, 0x10}, 0xc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000800000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x50) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8921, &(0x7f0000000080)) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x4000, r3}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_ext={0x1c, 0x17, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3065}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='syzkaller\x00', 0x3fcc, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000340)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0xa, 0x2, 0x9}, 0x10, 0x165e6, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r7, r9], 0x0, 0x10, 0x2}, 0x94) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_ext={0x1c, 0x17, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3065}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='syzkaller\x00', 0x3fcc, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000340)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0xa, 0x2, 0x9}, 0x10, 0x165e6, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r7, r9], 0x0, 0x10, 0x2}, 0x94) 25.353476203s ago: executing program 4 (id=694): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffff38c}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x0, 0xa, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') socketpair(0x29, 0x80809, 0x7fff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x40047451, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x3, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0xfffffebd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5f9, 0x0, @perf_config_ext={0x2, 0xb}, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b702000008000000bfa300000000000007030000ffffffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe40000900850000001f000000b70000000000000095000000000000006623848adf1dc9a764ab51a064caff0c9b27a26293fddf0180000071ff31f1622271d5518193e09483c5a020c334f8c76334d8ce8303b81ddaa52e8756ad60a07d6f27c125e16d024098f755d8583da60f27c162dbba0700002ac9170f50f2568836077b7f711a18ebf608d87b885297b6b6981978d51514b00dcc4a2748b376358c33c9753beab62bdf27dc04e4cb4bc598affd989b1ca58949a54d5827df14feecea46408a05d572077f1252fbb72c3d099c501bc4ded6fca17a3447222c95edb47b770009524edd5fa5c53e9c37251709f1ff7f0000f07bf7f53ce129a9ecd3b4dd15100f2b450f98526a0d8cac7c97fc2f64015306a1bd88345710fb6379b4c53cf55eefb4c0974486a8d25a363adbd83b49e13fbd1757b27020bd9b8cff3f48c9411670c34f23ab8caf7851b290feb3045a1b622f20c4383a0280f040de7667f8b1d0842835e81c35af41e5b5b924275cb1749289b44e9728e7a73f148ac8206afe120c1437490d9900000011000003971b32fdffffffffffffffaf580278e1342aabd1b623f6c4f128858e4eb6b42f2173184c2b99b645f6ec0e14e5d7c95a0008000000f30f6c0000000000ff0000b8f5001a1d2a34dc0973ec302bc23211d3e3b6e6dad65a51e5497a3419cecec38126247b27113ad4c7915c8f82c333a7b350802f0311807010d1ed50c18411aa6900daccc02f4ba4b078f07e41f781eee222c7d071d5a94d82ca9a0846c1af59cee16639b4970f8f0a82c6a712fd5722d677d406160ffaffffffb4e0bde6749aa52c408b74251914c5d3255fd88a42e7ebb69ebcd8eee623e51dbb1f1b548c91a6825c0686fdc16be1cbb72c217fda18bd746253ca66093daf35923300b600000000ac376e0a4649a8a84e1d293a6b109c5e59b366bca5cc3d936c53d4a48c05099e6fc37e5aa23bff8cce0600000000000300a568a8532623d12b40b50ac26f2e8255470a04bfbe7acb581b90991d965a01d1f84cb6b973558e1e3f8118c77ccf0b3c6eb6443870004da10c75723b65f83769ad1f0e4ef6b9ef1cec23264fd8fdac6264af1cb467020bdc12b797b6c156c439105829d2ae1c45f7cfa40df68f536a03353a55a8a8e176e5d48887d31c8e0f77f2c1e68ec7c01bd5a2028a8fc107007f5f4c67600a6ade3deb1f200abe1f753754678dae8b4e3ba3d086d4b95dfc5817e3dafae2d38b522f942cc750399d9029f071fdb1e05882f8a4b8fbd219ccac3a895828b4f22b6527ce31ceb02b7b2b4492510134552f0b076b168394f8417f25cc82ae04007193cbe69de8bf35e4bebd15412426b2020ab1f05fc44ae9ae094c1b81d3ef947692b44d2afb09c7498dedf0f87c38bbcab7357836f03e8a7c392e535694a3ead2de11e6b1781e2a017ac341fda2e563ee95085742f5fee9f95f4741b226e428d20b00bc140000e4b2f5efd0a0b1ceba000830ba8634b5aa26bdbe91614e92fae3c7349531df9bf4c01ebf5d8eb7d53e5f30647661623fbdb3f6c3652c423ce6ecc1be5d4e8133fc32f68ea86a2df1e7df98a0ae216c405d0ae9eed114ff2d6fe27dfdff1cf9194849c4cc0da9533e5983863e526a7dc0d8728f3b573ca4427bdb44df9341e9b8420e896598a156c935c800436a312e7ae3c011e46851ac599f0427729ab9c55ae0ab4c0000000000000000000000000000c87bcc2ac5aed9467b51d92e0993af4beaf1f3d47dcdfab9165f98155d93e383d6b85158b54675c1585037508c1e9461a1c3d1a6e2402045cae150a7016f716eebbdf6afc4414d900be0bdf19f4a273f44f4357380b4387f1c8b104f0e406b2f04e5ed88631be6411f9927fe9f83412b7c5a676ceec8b454ebf6481c98e86b6933a02daea0b4ec0be5b3d916bd70208b4588626c27c318475802e2c62681bd1a331422a6e47bbd40857d52c4894944fae5c5000000000000000000000000e0c47613e950b6aefeae054fc723f62ac7d13941de11b018f1f48ac50335df91c771729f81929128135b2803562c1171ee00a3f4a31281aa363e087d53d86dd85e3ff979a7e72d16fdd7e1a0f07a1c8e6085d280d760f74975ceb3a5be6cfb4da8e0aeb769b8b75f4aad803ed77d34872eed2711aa40a3b38099dc2752e8ec9b520faf39e416752aa0830206736570f5d41a4df848c9052551cf8dcb1be000000000eb2577188e8e96bd825d462350905d3eb916b397d2a46a64081e85661d7a5a2716cc87cb1976d15d9b6418e94f165911803e43830432226c660f4da67bb7c8ceb3755c07197d8b80b8d16b12c2ec63bebe107aa2350a7ae564bf69a6c52a2da1496016dd66a1c1b112"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd, 0x0, 0xffffffffffffffff, 0x28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000040)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001080)={{r0}, &(0x7f00000010c0), &(0x7f0000001040)=r7}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) 25.090651984s ago: executing program 1 (id=695): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[], 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0xb) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000a1a4884605e50dbf00"/28], 0x48) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000ddecb063b01e9259d692ccaae76b42fa319044c0bd2873d7d1faba37358159211fa61d57b7b040b16c15d232cd528bd84bef813c96719596"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r6) (async, rerun: 32) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000340)='module_request\x00', r6}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r6, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0xd3, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x97, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=r7], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0xd299, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100882, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffff7ffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae350000000000000000000000000001", @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) 25.026390599s ago: executing program 1 (id=697): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000340)=""/44, 0x2c, 0x0, &(0x7f0000000380)=""/128, 0x80}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0xa00, 0xc8, 0x4, 0x0, 0xfffffffffffffe01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece"], 0x0}, 0x94) sendmsg$unix(r10, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r9, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1b) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r12}, 0x10) close(0xffffffffffffffff) write$cgroup_subtree(r11, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r11, &(0x7f00000004c0)=ANY=[], 0xfdef) 24.910460769s ago: executing program 0 (id=698): bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000780)="b7359c36e1d9dcaf434fa8c527ef215d7fcdb5f189adf50b61e4a35411e2702ed5cc63be64bea3b78da61af5688b374b72391281025740592a92dd58d546721ab37f1fd77175a4fde8c75ead2fe08325b791c9d8d144837f7210a0878e31ea409cdeb9c473faa5f4eb05a3c9cbd7166548cb24f1e144c3a3f56c201be3261c0d86d0ce64644aee9c59fc3f813f3f58e42a259a121bfbb668f54f729d5fafeb17364541", 0xa3}], 0x2, &(0x7f0000000580)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18, 0x8040}, 0x40040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f00000000c0)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 24.827815945s ago: executing program 3 (id=699): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x13, 0x4, 0x8, 0x8}, 0x48) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xbe9c06, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x403}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) 24.827321405s ago: executing program 4 (id=700): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x8000}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) write$cgroup_devices(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0309004d8871ef2885634a8270e7112b00000000000000000000000000ac141401827511d5b4d3a9f536f45ae68ab6086c33"], 0xee8a) 24.823733786s ago: executing program 1 (id=701): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@cgroup=r1, 0x37, 0x1, 0x4, &(0x7f0000000280)=[0x0], 0x1, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340), &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000bc0)='./cgroup/syz1\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x9, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r2}, 0x38) 24.689060277s ago: executing program 0 (id=702): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703c5bb8f1c2fc9baa333264565838a72000008000000b70400000000925e8500000008a67000d21397c3f6a3ceba60fb117f35189df90f27168a5a3d411e729d84e59b29340c5779efbee9648fca0fa11af88f8cc4e708c2ef8e4b0ffa087ead8e6c5ff713e7b166c0e780d434edffdc2e4450370a5c6b4685a049aedb01e2606c75f5b957661030cecaef4068aa95e84dbedbfafe93"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="374a00000000820004000000ff000000000000005656e8ec0df91d98880c4628335b5aa43e6742f7e6301fd3b75068ec1c4ea4492b8a9a88f04bd7935b746351df85c8271af35b5b14a62496c36f467c7a6ac6a8929ea72638f0f01cdf7e5479e5e5a96c492f96ac6c4727e842337771388daf2490abbfc8d5383553ff0d70594c88", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r7, @ANYBLOB="ff0000000000ecffffffffffffff000000001464", @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="000000000400"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r9, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) 24.608899403s ago: executing program 4 (id=703): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000009955cbd76d2fa9b85ab62b31b3f1ed831e8c3bf74cb8bbd1f978c32eac8aa0a614985eabc3921aeaa04a78d3f886f45f99d2c39cdf272286eb9930451bd6dd60e75b786a6404da2cbde3f9a7bfb500"/106], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) r5 = openat$cgroup_subtree(r3, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000001c0)={[{0x2d, 'io'}, {0x2b, 'cpuacct'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x1b) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 23.983549194s ago: executing program 0 (id=704): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r6}, 0x10) (async) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) 23.658634919s ago: executing program 2 (id=705): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000001a00000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000100000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x800000, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r5, 0x0, &(0x7f0000002240)=""/4097}, 0x20) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="dce59db73286a2df26622f8513984b063402106d89d235690b77320d83d260d4ff67bd0367fb7f8a7a46bf083e0bfad4ff4e4ce8a67fe70d9fe17b3071ff630498dcb9e0736f5ba3004a3d9cdb0c8fc9f54cf3f3b3f3317c19ad30ac0d894de71f7d62ab4393f89ef57f0645b8cdf248ec538f90b761bb09411433df2b9468ab0d8843f08b302de795d3539c16208b93ce4ac97adc9ce0ddfcbff7b64cf27b9c8f40a8d51695260b35d1f7cf840f64cc9a65ff486bbf60e316052a1a166c4165d804a6cad0357e7690993e4804d463ed7872932440da2d5ffe77257d9eefeca309e5cbf5"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x18) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r11, 0x4004743d, 0x110e22fff6) write$cgroup_type(r11, &(0x7f0000000280), 0x9) sendmsg$tipc(r7, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(r6) 21.435515928s ago: executing program 0 (id=706): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f00000023c0), 0x9}, 0x20001) 20.90544888s ago: executing program 0 (id=707): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r2}, 0x18) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x39930000}, 0x94) 15.821799299s ago: executing program 0 (id=708): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000400121001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000002000083850000007100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000080000f470545d9d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000080000f470545d9d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8982, 0x0) 5.313586403s ago: executing program 32 (id=701): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@cgroup=r1, 0x37, 0x1, 0x4, &(0x7f0000000280)=[0x0], 0x1, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340), &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000bc0)='./cgroup/syz1\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x9, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r2}, 0x38) 5.065094743s ago: executing program 33 (id=705): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000001a00000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000100000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x800000, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r5, 0x0, &(0x7f0000002240)=""/4097}, 0x20) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="dce59db73286a2df26622f8513984b063402106d89d235690b77320d83d260d4ff67bd0367fb7f8a7a46bf083e0bfad4ff4e4ce8a67fe70d9fe17b3071ff630498dcb9e0736f5ba3004a3d9cdb0c8fc9f54cf3f3b3f3317c19ad30ac0d894de71f7d62ab4393f89ef57f0645b8cdf248ec538f90b761bb09411433df2b9468ab0d8843f08b302de795d3539c16208b93ce4ac97adc9ce0ddfcbff7b64cf27b9c8f40a8d51695260b35d1f7cf840f64cc9a65ff486bbf60e316052a1a166c4165d804a6cad0357e7690993e4804d463ed7872932440da2d5ffe77257d9eefeca309e5cbf5"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x18) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r11, 0x4004743d, 0x110e22fff6) write$cgroup_type(r11, &(0x7f0000000280), 0x9) sendmsg$tipc(r7, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(r6) 4.85188263s ago: executing program 34 (id=699): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x13, 0x4, 0x8, 0x8}, 0x48) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xbe9c06, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x403}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.705310081s ago: executing program 35 (id=703): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000009955cbd76d2fa9b85ab62b31b3f1ed831e8c3bf74cb8bbd1f978c32eac8aa0a614985eabc3921aeaa04a78d3f886f45f99d2c39cdf272286eb9930451bd6dd60e75b786a6404da2cbde3f9a7bfb500"/106], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) r5 = openat$cgroup_subtree(r3, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000001c0)={[{0x2d, 'io'}, {0x2b, 'cpuacct'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x1b) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 36 (id=708): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000400121001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000002000083850000007100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000080000f470545d9d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000080000f470545d9d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8982, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.4' (ED25519) to the list of known hosts. [ 19.248518][ T30] audit: type=1400 audit(1756613767.643:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.249793][ T273] cgroup: Unknown subsys name 'net' [ 19.255256][ T30] audit: type=1400 audit(1756613767.643:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.261123][ T30] audit: type=1400 audit(1756613767.663:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.261277][ T273] cgroup: Unknown subsys name 'devices' [ 19.475160][ T273] cgroup: Unknown subsys name 'hugetlb' [ 19.480874][ T273] cgroup: Unknown subsys name 'rlimit' [ 19.674828][ T30] audit: type=1400 audit(1756613768.073:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.699244][ T30] audit: type=1400 audit(1756613768.073:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 19.707636][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.725332][ T30] audit: type=1400 audit(1756613768.073:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.741779][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.757705][ T30] audit: type=1400 audit(1756613768.143:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.792262][ T30] audit: type=1400 audit(1756613768.143:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.818095][ T30] audit: type=1400 audit(1756613768.143:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.844302][ T30] audit: type=1400 audit(1756613768.143:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.734517][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.741598][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.749318][ T281] device bridge_slave_0 entered promiscuous mode [ 20.757945][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.765129][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.772702][ T281] device bridge_slave_1 entered promiscuous mode [ 20.873614][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.880833][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.888812][ T282] device bridge_slave_0 entered promiscuous mode [ 20.905243][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.912637][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.920159][ T282] device bridge_slave_1 entered promiscuous mode [ 20.950837][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.958157][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.965986][ T283] device bridge_slave_0 entered promiscuous mode [ 20.983344][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.990576][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.998269][ T283] device bridge_slave_1 entered promiscuous mode [ 21.031119][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.040938][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.049072][ T285] device bridge_slave_0 entered promiscuous mode [ 21.056013][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.063446][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.070969][ T285] device bridge_slave_1 entered promiscuous mode [ 21.114970][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.122478][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.130351][ T284] device bridge_slave_0 entered promiscuous mode [ 21.138607][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.145731][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.153539][ T284] device bridge_slave_1 entered promiscuous mode [ 21.224055][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.231452][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.239033][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.246283][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.307344][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.315352][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.325300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.333550][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.355464][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.363880][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.370902][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.404029][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.412962][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.420740][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.429122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.437705][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.480495][ T281] device veth0_vlan entered promiscuous mode [ 21.489860][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.498243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.506950][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.515498][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.524626][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.532488][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.540252][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.549203][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.556459][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.564287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.572581][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.580012][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.587720][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.608682][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.617029][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.624064][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.631640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.640201][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.647913][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.656918][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.684365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.692794][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.701449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.711108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.736584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.745311][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.754049][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.761159][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.768924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.777142][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.784886][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.793705][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.801804][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.809061][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.817103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.825897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.834369][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.841643][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.849533][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.858344][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.867210][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.874566][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.882301][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.890698][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.899205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.907353][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.916101][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.924420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.932467][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.940868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.950429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.958661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.967184][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.975149][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.985609][ T281] device veth1_macvtap entered promiscuous mode [ 21.997712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.006425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.014867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.033103][ T285] device veth0_vlan entered promiscuous mode [ 22.041877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.050961][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.059933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.068140][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.086577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.094554][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 22.095184][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.110367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.119064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.127957][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.137482][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.147666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.156879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.166362][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.175161][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.190949][ T285] device veth1_macvtap entered promiscuous mode [ 22.210129][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.218823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.227138][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.235245][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.244083][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.252795][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.262021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.275212][ T282] device veth0_vlan entered promiscuous mode [ 22.281722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.289839][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.307972][ T284] device veth0_vlan entered promiscuous mode [ 22.325451][ T283] device veth0_vlan entered promiscuous mode [ 22.333802][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.342421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.350465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.359008][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.373646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.383223][ C1] hrtimer: interrupt took 19916 ns [ 22.392058][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.401365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.416076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.425574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.434730][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.443022][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.451301][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.470944][ T283] device veth1_macvtap entered promiscuous mode [ 22.524995][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.539661][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.549361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.560079][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.569219][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.586672][ T284] device veth1_macvtap entered promiscuous mode [ 22.600395][ T282] device veth1_macvtap entered promiscuous mode [ 22.614818][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.622538][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.631852][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.640740][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.649617][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.658631][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.668331][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.709117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.719061][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.727843][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.736942][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.745737][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.754414][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.788942][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.798286][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.573909][ T30] kauditd_printk_skb: 41 callbacks suppressed [ 24.573937][ T30] audit: type=1400 audit(1756613772.973:115): avc: denied { cpu } for pid=446 comm="syz.2.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 24.672542][ T30] audit: type=1400 audit(1756613773.033:116): avc: denied { read } for pid=451 comm="syz.1.34" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 24.698038][ T30] audit: type=1400 audit(1756613773.033:117): avc: denied { open } for pid=451 comm="syz.1.34" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 24.764949][ T30] audit: type=1400 audit(1756613773.033:118): avc: denied { ioctl } for pid=451 comm="syz.1.34" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 24.868340][ T30] audit: type=1400 audit(1756613773.063:119): avc: denied { ioctl } for pid=446 comm="syz.2.32" path="socket:[15903]" dev="sockfs" ino=15903 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 24.992655][ T30] audit: type=1400 audit(1756613773.243:120): avc: denied { relabelfrom } for pid=455 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.013451][ T30] audit: type=1400 audit(1756613773.243:121): avc: denied { relabelto } for pid=455 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.476445][ T30] audit: type=1400 audit(1756613773.873:122): avc: denied { create } for pid=488 comm="syz.3.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 25.600322][ T30] audit: type=1400 audit(1756613773.943:123): avc: denied { create } for pid=488 comm="syz.3.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 26.025434][ T30] audit: type=1400 audit(1756613774.423:124): avc: denied { create } for pid=521 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.348040][ T547] device veth1_macvtap left promiscuous mode [ 26.365449][ T547] device veth1_macvtap entered promiscuous mode [ 26.372166][ T547] device macsec0 entered promiscuous mode [ 26.724810][ T564] device veth1_macvtap left promiscuous mode [ 27.246151][ T584] device pim6reg1 entered promiscuous mode [ 28.574538][ T611] ÿÿÿÿÿÿ_“–ÿ’¯: renamed from vlan1 [ 28.697637][ T622] device sit0 entered promiscuous mode [ 28.955257][ T637] device sit0 left promiscuous mode [ 29.632960][ T654] device veth0_vlan left promiscuous mode [ 29.733130][ T654] device veth0_vlan entered promiscuous mode [ 30.097439][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 30.097456][ T30] audit: type=1400 audit(1756613778.493:130): avc: denied { create } for pid=663 comm="syz.4.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 30.206139][ T667] device syzkaller0 entered promiscuous mode [ 30.414206][ T684] syz.4.97[684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.414281][ T684] syz.4.97[684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.559025][ T702] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.578190][ T702] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.390585][ T30] audit: type=1400 audit(1756613779.783:131): avc: denied { create } for pid=733 comm="syz.3.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 33.806911][ T759] bond_slave_1: mtu less than device minimum [ 33.844617][ T762] device syzkaller0 entered promiscuous mode [ 34.138151][ T30] audit: type=1400 audit(1756613782.533:132): avc: denied { create } for pid=775 comm="syz.2.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 34.675861][ T30] audit: type=1400 audit(1756613783.073:133): avc: denied { create } for pid=794 comm="syz.2.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 35.195790][ T805] device wg2 entered promiscuous mode [ 35.366177][ T30] audit: type=1400 audit(1756613783.763:134): avc: denied { create } for pid=820 comm="syz.3.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 35.782603][ T847] GPL: port 1(erspan0) entered blocking state [ 35.791777][ T847] GPL: port 1(erspan0) entered disabled state [ 35.803767][ T847] device erspan0 entered promiscuous mode [ 35.830920][ T30] audit: type=1400 audit(1756613784.223:135): avc: denied { associate } for pid=850 comm="syz.3.144" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 35.866483][ T856] GPL: port 1(erspan0) entered blocking state [ 35.872729][ T856] GPL: port 1(erspan0) entered forwarding state [ 35.918654][ T828] device pim6reg1 entered promiscuous mode [ 36.151766][ T863] device syzkaller0 entered promiscuous mode [ 36.296273][ T863] device veth0_vlan left promiscuous mode [ 36.324691][ T863] device veth0_vlan entered promiscuous mode [ 36.489445][ T883] device syzkaller0 entered promiscuous mode [ 36.718455][ T902] device sit0 entered promiscuous mode [ 36.858833][ T905] device sit0 entered promiscuous mode [ 37.101616][ T919] device syzkaller0 entered promiscuous mode [ 37.751058][ T951] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.758517][ T951] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.808806][ T953] device bridge_slave_1 left promiscuous mode [ 37.835443][ T953] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.879741][ T953] device bridge_slave_0 left promiscuous mode [ 37.890173][ T953] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.049501][ T963] bond_slave_1: mtu less than device minimum [ 38.202844][ T30] audit: type=1400 audit(1756613786.593:136): avc: denied { create } for pid=984 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 38.330517][ T980] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 38.339066][ T980] syzkaller0: owner set to 1 [ 38.440608][ T994] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 38.885019][ T1012] device syzkaller0 entered promiscuous mode [ 38.909262][ T1000] device wg2 entered promiscuous mode [ 39.371590][ T1031] device pim6reg1 entered promiscuous mode [ 39.676179][ T1051] device veth0_vlan left promiscuous mode [ 39.692213][ T1051] device veth0_vlan entered promiscuous mode [ 39.999107][ T1067] device syzkaller0 entered promiscuous mode [ 40.292654][ T30] audit: type=1400 audit(1756613788.683:137): avc: denied { create } for pid=1073 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 40.405589][ T1078] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.414410][ T1078] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.565828][ T1093] device bridge_slave_1 left promiscuous mode [ 40.573773][ T1093] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.585542][ T1093] device bridge_slave_0 left promiscuous mode [ 40.593900][ T1093] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.701103][ T1094] device veth1_macvtap left promiscuous mode [ 40.889058][ T1102] ------------[ cut here ]------------ [ 40.894849][ T1102] trace type BPF program uses run-time allocation [ 40.929361][ T1102] WARNING: CPU: 0 PID: 1102 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 40.946533][ T1102] Modules linked in: [ 40.951432][ T1102] CPU: 0 PID: 1102 Comm: syz.4.218 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 41.003750][ T1102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 41.015828][ T1102] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 41.028080][ T1102] Code: ee ff 48 c7 c6 20 ec 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 56 4c ee ff c6 05 43 92 6b 05 01 48 c7 c7 80 e8 47 85 e8 a3 e9 24 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 41.062574][ T1102] RSP: 0018:ffffc90000c57428 EFLAGS: 00010246 [ 41.069131][ T1102] RAX: daeec9320cbef700 RBX: 0000000000000001 RCX: ffff888119f8cf00 [ 41.078874][ T1102] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 41.087704][ T1102] RBP: ffffc90000c57470 R08: dffffc0000000000 R09: ffffed103ee065e8 [ 41.099937][ T1102] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff88810f88c000 [ 41.131679][ T1102] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811adf5800 [ 41.153399][ T1102] FS: 00007f519564b6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 41.167366][ T1102] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.215112][ T1102] CR2: 000000110c2a9756 CR3: 00000001173e3000 CR4: 00000000003506a0 [ 41.242426][ T1124] device team_slave_1 entered promiscuous mode [ 41.255374][ T1102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.274078][ T1102] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 41.291524][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 41.300023][ T1102] Call Trace: [ 41.304930][ T1102] [ 41.308856][ T1102] resolve_pseudo_ldimm64+0x685/0x11d0 [ 41.311434][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 41.321211][ T1102] ? check_attach_btf_id+0xde0/0xde0 [ 41.330322][ T1102] ? __mark_reg_known+0x1b0/0x1b0 [ 41.335910][ T1102] ? security_capable+0x87/0xb0 [ 41.341927][ T1102] bpf_check+0x2c44/0xf330 [ 41.348056][ T1102] ? is_bpf_text_address+0x177/0x190 [ 41.354425][ T1102] ? bpf_get_btf_vmlinux+0x60/0x60 [ 41.359801][ T1102] ? unwind_get_return_address+0x4d/0x90 [ 41.366998][ T1102] ? stack_trace_save+0xe0/0xe0 [ 41.373856][ T1102] ? arch_stack_walk+0xee/0x140 [ 41.379397][ T1102] ? stack_trace_save+0x98/0xe0 [ 41.395762][ T1102] ? __stack_depot_save+0x34/0x480 [ 41.401302][ T1102] ? __kasan_slab_alloc+0x69/0xf0 [ 41.407035][ T1102] ? _find_next_bit+0x1fa/0x200 [ 41.412157][ T1102] ? __kasan_kmalloc+0xec/0x110 [ 41.418511][ T1102] ? __kasan_kmalloc+0xda/0x110 [ 41.448628][ T1102] ? kmem_cache_alloc_trace+0x119/0x270 [ 41.492653][ T1102] ? selinux_bpf_prog_alloc+0x51/0x140 [ 41.538434][ T1102] ? security_bpf_prog_alloc+0x62/0x90 [ 41.563145][ T30] audit: type=1400 audit(1756613789.953:138): avc: denied { create } for pid=1144 comm="syz.1.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 41.593614][ T1102] ? bpf_prog_load+0x97c/0x1550 [ 41.599144][ T1102] ? __sys_bpf+0x4c3/0x730 [ 41.619507][ T1102] ? __x64_sys_bpf+0x7c/0x90 [ 41.635076][ T1102] ? x64_sys_call+0x4b9/0x9a0 [ 41.641119][ T1102] ? do_syscall_64+0x4c/0xa0 [ 41.673355][ T1102] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.698374][ T1102] ? check_stack_object+0x81/0x140 [ 41.707631][ T1102] ? memset+0x35/0x40 [ 41.712436][ T1102] ? bpf_obj_name_cpy+0x193/0x1e0 [ 41.718634][ T1102] bpf_prog_load+0x1042/0x1550 [ 41.725991][ T1102] ? map_freeze+0x360/0x360 [ 41.731803][ T1102] ? selinux_bpf+0xc7/0xf0 [ 41.738144][ T1102] ? security_bpf+0x82/0xa0 [ 41.743026][ T1102] __sys_bpf+0x4c3/0x730 [ 41.748833][ T30] audit: type=1400 audit(1756613790.133:139): avc: denied { create } for pid=1144 comm="syz.1.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 41.823328][ T1102] ? bpf_link_show_fdinfo+0x310/0x310 [ 41.846347][ T1146] GPL: port 1(erspan0) entered blocking state [ 41.853396][ T1102] ? __kasan_check_write+0x14/0x20 [ 41.858796][ T1102] ? switch_fpu_return+0x15d/0x2c0 [ 41.872537][ T30] audit: type=1400 audit(1756613790.183:140): avc: denied { append } for pid=1128 comm="syz.2.224" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 41.898126][ T1146] GPL: port 1(erspan0) entered disabled state [ 41.905691][ T1146] device erspan0 entered promiscuous mode [ 41.912605][ T1102] __x64_sys_bpf+0x7c/0x90 [ 41.917648][ T1102] x64_sys_call+0x4b9/0x9a0 [ 41.922299][ T1102] do_syscall_64+0x4c/0xa0 [ 41.926925][ T1102] ? clear_bhb_loop+0x50/0xa0 [ 41.931937][ T1102] ? clear_bhb_loop+0x50/0xa0 [ 41.939013][ T1102] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.949657][ T1102] RIP: 0033:0x7f5196be2be9 [ 41.959036][ T1102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.031212][ T1102] RSP: 002b:00007f519564b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.058857][ T1102] RAX: ffffffffffffffda RBX: 00007f5196e19fa0 RCX: 00007f5196be2be9 [ 42.120253][ T1102] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 42.160841][ T1102] RBP: 00007f5196c65e19 R08: 0000000000000000 R09: 0000000000000000 [ 42.218327][ T1102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 42.270421][ T1102] R13: 00007f5196e1a038 R14: 00007f5196e19fa0 R15: 00007ffd2c4e3c18 [ 42.320241][ T1102] [ 42.333878][ T1102] ---[ end trace 7e74fd4b3dc6bab4 ]--- [ 42.452250][ T1170] device pim6reg1 entered promiscuous mode [ 42.899141][ T1178] device wg2 entered promiscuous mode [ 43.013114][ T1180] device sit0 entered promiscuous mode [ 43.591473][ T1202] device syzkaller0 entered promiscuous mode [ 45.140367][ T1237] €Â0: renamed from pim6reg1 [ 45.597963][ T1246] ªªªªªªÿÿ: renamed from veth0_vlan [ 45.702578][ T1246] device sit0 left promiscuous mode [ 45.804703][ T1246] device sit0 entered promiscuous mode [ 46.547722][ T30] audit: type=1400 audit(1756613794.943:141): avc: denied { create } for pid=1265 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 47.040841][ T1295] syz.0.273[1295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.040909][ T1295] syz.0.273[1295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.135796][ T30] audit: type=1400 audit(1756613795.533:142): avc: denied { create } for pid=1296 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 47.186281][ T1293] device pim6reg1 entered promiscuous mode [ 49.143206][ C0] sched: RT throttling activated [ 50.826803][ T1323] device sit0 left promiscuous mode [ 51.975971][ T1397] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 52.173011][ T30] audit: type=1400 audit(1756613800.563:143): avc: denied { create } for pid=1408 comm="syz.2.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 52.349058][ T30] audit: type=1400 audit(1756613800.743:144): avc: denied { read } for pid=1419 comm="syz.2.310" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 52.421730][ T30] audit: type=1400 audit(1756613800.783:145): avc: denied { open } for pid=1419 comm="syz.2.310" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 54.346192][ T1477] device veth1_macvtap left promiscuous mode [ 54.369543][ T1477] device macsec0 left promiscuous mode [ 54.913378][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.206182][ T30] audit: type=1400 audit(1756613803.603:146): avc: denied { ioctl } for pid=1513 comm="syz.1.336" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 56.558843][ T30] audit: type=1400 audit(1756613804.953:147): avc: denied { create } for pid=1554 comm="syz.1.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 58.001961][ T1621] device syzkaller0 entered promiscuous mode [ 58.027835][ T1617] device pim6reg1 entered promiscuous mode [ 58.246069][ T1635] device syzkaller0 entered promiscuous mode [ 58.871185][ T1695] device veth1_macvtap left promiscuous mode [ 58.937339][ T1705] device wg2 left promiscuous mode [ 58.961494][ T1695] device wg2 entered promiscuous mode [ 59.311006][ T1715] device pim6reg1 entered promiscuous mode [ 59.453912][ T1719] device pim6reg1 entered promiscuous mode [ 61.116064][ T1781] device syzkaller0 entered promiscuous mode [ 61.375407][ T30] audit: type=1400 audit(1756613809.773:148): avc: denied { create } for pid=1790 comm="syz.3.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 61.757914][ T1835] device syzkaller0 entered promiscuous mode [ 62.009747][ T30] audit: type=1400 audit(1756613810.403:149): avc: denied { create } for pid=1846 comm="syz.4.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 62.988563][ T1890] ÿÿÿÿÿÿ_“–ÿ’¯: renamed from vlan1 [ 63.287353][ T1911] bridge0: port 3(veth1) entered blocking state [ 63.325444][ T1911] bridge0: port 3(veth1) entered disabled state [ 63.338550][ T1911] device veth1 entered promiscuous mode [ 63.347026][ T1911] bridge0: port 3(veth1) entered blocking state [ 63.354952][ T1911] bridge0: port 3(veth1) entered forwarding state [ 63.636002][ T1946] device sit0 left promiscuous mode [ 64.876612][ T2010] syz.1.481[2010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.876725][ T2010] syz.1.481[2010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.928226][ T2010] device pim6reg1 entered promiscuous mode [ 65.067296][ T2021] device pim6reg1 entered promiscuous mode [ 65.509786][ T2052] bond_slave_1: mtu less than device minimum [ 65.601600][ T2063] syz.2.493[2063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.601747][ T2063] syz.2.493[2063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.933069][ T2070] device pim6reg1 entered promiscuous mode [ 66.566141][ T2115] device syzkaller0 entered promiscuous mode [ 67.196635][ T30] audit: type=1400 audit(1756613815.593:150): avc: denied { create } for pid=2147 comm="syz.0.519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 68.422554][ T2175] device syzkaller0 entered promiscuous mode [ 68.944926][ T2208] device wg2 left promiscuous mode [ 68.981199][ T2219] device wg2 entered promiscuous mode [ 69.398978][ T30] audit: type=1400 audit(1756613817.783:151): avc: denied { create } for pid=2257 comm="syz.1.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 69.696206][ T30] audit: type=1400 audit(1756613818.093:152): avc: denied { create } for pid=2267 comm="syz.2.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 70.410664][ T2289] device veth0_vlan left promiscuous mode [ 70.466136][ T2289] device veth0_vlan entered promiscuous mode [ 70.600575][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.614008][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.645011][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 70.746508][ T2294] bridge0: port 4(veth0) entered blocking state [ 70.769479][ T2294] bridge0: port 4(veth0) entered disabled state [ 70.776742][ T2294] device veth0 entered promiscuous mode [ 70.784873][ T2294] bridge0: port 4(veth0) entered blocking state [ 70.791766][ T2294] bridge0: port 4(veth0) entered forwarding state [ 71.143722][ T2309] device syzkaller0 entered promiscuous mode [ 74.043657][ T2414] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 74.593175][ T2425] device veth1_macvtap left promiscuous mode [ 75.658802][ T2481] device pim6reg1 entered promiscuous mode [ 75.884702][ T2491] device sit0 entered promiscuous mode [ 75.954546][ T2487] device sit0 left promiscuous mode [ 76.038520][ T2497] device sit0 left promiscuous mode [ 76.160326][ T2511] device sit0 entered promiscuous mode [ 77.021514][ T2557] device syzkaller0 entered promiscuous mode [ 77.238251][ T2567] syz.0.640[2567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.238330][ T2567] syz.0.640[2567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.393160][ T2567] device veth0_vlan left promiscuous mode [ 77.420914][ T2567] device veth0_vlan entered promiscuous mode [ 77.444608][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.455691][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.491184][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.000470][ T2656] device syzkaller0 entered promiscuous mode [ 79.136167][ T2661] syz.4.666[2661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.136269][ T2661] syz.4.666[2661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.230893][ T2661] device pim6reg1 entered promiscuous mode [ 79.334579][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 79.347621][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 79.361630][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 79.374791][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 79.387678][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 79.400520][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 79.413131][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 79.425791][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 79.438821][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 79.452809][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 84.347611][ C1] net_ratelimit: 7710 callbacks suppressed [ 84.347640][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 84.380071][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 84.400608][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 84.420641][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 84.439289][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 84.457389][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 84.479959][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 84.499339][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 84.516841][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 84.533111][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 86.415014][ T2787] ªªªªªª: renamed from vlan0 [ 87.465444][ T2805] device syzkaller0 entered promiscuous mode [ 89.353264][ C0] net_ratelimit: 28621 callbacks suppressed [ 89.353284][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 89.353364][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 89.359936][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 89.372334][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 89.383975][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 89.396823][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 89.408176][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 89.419549][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 89.431010][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 89.443523][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 94.363224][ C0] net_ratelimit: 36747 callbacks suppressed [ 94.363243][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.367946][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 94.369562][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.369654][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.369742][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.369832][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.369932][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.370020][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.370111][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.370206][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 99.374245][ C0] net_ratelimit: 11718 callbacks suppressed [ 99.374280][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 99.382825][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 99.395629][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 99.406714][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 99.418748][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 99.442265][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 99.445429][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 99.458123][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 99.469848][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 99.490293][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 104.383208][ C0] net_ratelimit: 15502 callbacks suppressed [ 104.383260][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 104.385970][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 104.390477][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 104.403422][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 104.414639][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 104.430761][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 104.437829][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 104.450372][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 104.461099][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 104.478992][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 109.396738][ C0] net_ratelimit: 18286 callbacks suppressed [ 109.396952][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 109.400221][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 109.405342][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 109.417142][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 109.430891][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 109.445742][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 109.454053][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 109.465321][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 109.477642][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 109.493831][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 114.408955][ C0] net_ratelimit: 4655 callbacks suppressed [ 114.409031][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 114.411080][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 114.418160][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 114.430490][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 114.442680][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 114.462830][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 114.467060][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 114.479052][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 114.490920][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 114.510930][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 119.413578][ C1] net_ratelimit: 10765 callbacks suppressed [ 119.413605][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 119.414815][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 119.420082][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 119.420589][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 119.420674][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 119.421154][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 119.421238][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 119.421711][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 119.421797][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 119.422283][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 124.423244][ C1] net_ratelimit: 17906 callbacks suppressed [ 124.423264][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 124.424654][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 124.429803][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 124.429898][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 124.430418][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 124.430514][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 124.431028][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 124.431130][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 124.431691][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 124.431785][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 129.433279][ C1] net_ratelimit: 17929 callbacks suppressed [ 129.433298][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 129.434012][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 129.439599][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 129.440065][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 129.440158][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 129.440622][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 129.440706][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 129.441194][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 129.441279][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 129.441743][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 134.443194][ C1] net_ratelimit: 17884 callbacks suppressed [ 134.443214][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 134.443708][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 134.449443][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 134.450048][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 134.450150][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 134.450711][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 134.450806][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 134.464629][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 134.474101][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 134.474201][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 139.453257][ C1] net_ratelimit: 15396 callbacks suppressed [ 139.453278][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 139.454767][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 139.459990][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 139.460083][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 139.460806][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 139.474398][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 139.483239][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 139.483962][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 139.484053][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 139.493884][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 144.463765][ C1] net_ratelimit: 13879 callbacks suppressed [ 144.463785][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 144.464255][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 144.469808][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 144.469906][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 144.470873][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 144.470966][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 144.471056][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 144.471974][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 144.472059][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 144.472150][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 149.473927][ C1] net_ratelimit: 14525 callbacks suppressed [ 149.473946][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 149.475624][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 149.480158][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 149.480246][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 149.481106][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 149.481197][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 149.481290][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 149.482137][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 149.482224][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 149.482308][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 154.483267][ C1] net_ratelimit: 14744 callbacks suppressed [ 154.483287][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 154.484731][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 154.489393][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 154.489482][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 154.490337][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 154.490424][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 154.490518][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 154.491358][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 154.491450][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 154.491535][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 159.493236][ C0] net_ratelimit: 39272 callbacks suppressed [ 159.493255][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.496964][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 159.499361][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.499460][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.499552][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.499640][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.499730][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.499840][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.499939][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.512505][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 164.503174][ C1] net_ratelimit: 30170 callbacks suppressed [ 164.503193][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 164.503254][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.509240][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 164.509330][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 164.521310][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.532970][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 164.544612][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.555006][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 164.563208][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 164.567323][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.513852][ C1] net_ratelimit: 16661 callbacks suppressed [ 169.513871][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 169.514316][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.519971][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 169.520059][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 169.520154][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 169.520959][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 169.532675][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.543034][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 169.555217][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.565654][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 174.523216][ C0] net_ratelimit: 61765 callbacks suppressed [ 174.523234][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.524481][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 174.529328][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.529407][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.529494][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.529572][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.529655][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.529732][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.529810][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.529887][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.533366][ C0] net_ratelimit: 45424 callbacks suppressed [ 179.533460][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.533739][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 179.533812][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 179.540310][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.550884][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 179.550966][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 179.551729][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 179.562789][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.573518][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 179.573609][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 184.543375][ C0] net_ratelimit: 22794 callbacks suppressed [ 184.543407][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 184.543874][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 184.543957][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 184.544031][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 184.544104][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 184.544777][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 184.550938][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 184.561298][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 184.561392][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 184.561467][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 189.553194][ C0] net_ratelimit: 76866 callbacks suppressed [ 189.553214][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.558675][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 189.559223][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.559299][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.559374][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.559447][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.559533][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.559611][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.559686][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.559757][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.563157][ C0] net_ratelimit: 77730 callbacks suppressed [ 194.563178][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.565473][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 194.569311][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.569390][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.569476][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.569575][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.569663][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.569741][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.569824][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.569901][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 199.573184][ C1] net_ratelimit: 75156 callbacks suppressed [ 199.573203][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 199.573387][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 199.579986][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 199.580102][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 199.580182][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 199.580259][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 199.581019][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 199.581096][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 199.581179][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 199.581254][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 204.583488][ C1] net_ratelimit: 21935 callbacks suppressed [ 204.583507][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 204.584036][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 204.589600][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 204.589682][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 204.589755][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 204.590475][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 204.590549][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 204.590622][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 204.590701][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 204.591467][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 209.593159][ C1] net_ratelimit: 29748 callbacks suppressed [ 209.593177][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 209.593575][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 209.599859][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 209.611344][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 209.621706][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 209.621783][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 209.621857][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 209.623339][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 209.634174][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 209.644593][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 214.603193][ C0] net_ratelimit: 77165 callbacks suppressed [ 214.603213][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.603485][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 214.609220][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.621464][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 214.631523][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.631600][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.631675][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.631759][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.631834][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.631908][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.613146][ C0] net_ratelimit: 47285 callbacks suppressed [ 219.613168][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.623058][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 219.630394][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.630475][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.630561][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.630637][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.630713][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.630790][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.630872][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.630948][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.623269][ C1] net_ratelimit: 43989 callbacks suppressed [ 224.623291][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 224.624218][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.629391][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 224.629473][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 224.629552][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 224.630350][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 224.630436][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 224.630515][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 224.630594][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 224.631370][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 229.633179][ C1] net_ratelimit: 26971 callbacks suppressed [ 229.633198][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 229.635283][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.639281][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 229.639360][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 229.643871][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 229.652642][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.662355][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 229.662455][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 229.662554][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 229.663598][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 234.643381][ C1] net_ratelimit: 34377 callbacks suppressed [ 234.643402][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 234.646036][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.649607][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 234.649685][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 234.649770][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 234.650493][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 234.650575][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 234.650649][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 234.650724][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 234.651473][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 239.653211][ C0] net_ratelimit: 50627 callbacks suppressed [ 239.653259][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.653803][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 239.661451][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.670623][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 239.670702][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 239.670778][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 239.671506][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 239.671581][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 239.671662][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 239.673183][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 244.663177][ C0] net_ratelimit: 42486 callbacks suppressed [ 244.663197][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.668392][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 244.669325][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.669406][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.669492][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.669567][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.669648][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.669723][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.669803][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.669875][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.375185][ T31] INFO: task syz.1.701:2796 blocked for more than 123 seconds. [ 247.382777][ T31] Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 247.444242][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 247.453045][ T31] task:syz.1.701 state:D stack:25608 pid: 2796 ppid: 282 flags:0x00004004 [ 247.493176][ T31] Call Trace: [ 247.496498][ T31] [ 247.499441][ T31] __schedule+0xb6e/0x14c0 [ 247.543396][ T31] ? release_firmware_map_entry+0x190/0x190 [ 247.549611][ T31] ? __mutex_add_waiter+0xc7/0x270 [ 247.583654][ T31] ? __kasan_check_write+0x14/0x20 [ 247.589016][ T31] ? __ww_mutex_check_waiters+0x350/0x350 [ 247.634316][ T31] schedule+0x11e/0x1e0 [ 247.638697][ T31] schedule_preempt_disabled+0x13/0x20 [ 247.673406][ T31] __mutex_lock+0x7b6/0x11b0 [ 247.678056][ T31] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 247.709494][ T31] ? clear_inode+0x107/0x150 [ 247.733871][ T31] ? sock_alloc_inode+0xb0/0xb0 [ 247.738854][ T31] ? evict+0x7da/0x870 [ 247.742942][ T31] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 247.794349][ T31] ? proc_nr_inodes+0x310/0x310 [ 247.799240][ T31] ? _raw_spin_lock+0x8e/0xe0 [ 247.826913][ T31] __mutex_lock_slowpath+0xe/0x10 [ 247.831977][ T31] mutex_lock+0x100/0x1a0 [ 247.854087][ T31] ? wait_for_completion_killable_timeout+0x10/0x10 [ 247.860722][ T31] rtnl_lock+0x15/0x20 [ 247.884135][ T31] bpf_exit_net+0x32/0x150 [ 247.888600][ T31] ? bpf_init_net+0x1f0/0x1f0 [ 247.895213][ T31] setup_net+0x731/0xa90 [ 247.899484][ T31] ? copy_net_ns+0x5c0/0x5c0 [ 247.913914][ T31] copy_net_ns+0x355/0x5c0 [ 247.918358][ T31] create_new_namespaces+0x3a2/0x660 [ 248.023994][ T31] copy_namespaces+0x1d1/0x220 [ 248.028853][ T31] ? copy_signal+0x4cb/0x600 [ 248.053520][ T31] copy_process+0x118d/0x3210 [ 248.058266][ T31] ? __pidfd_prepare+0x150/0x150 [ 248.073462][ T31] ? __fget_files+0x2c4/0x320 [ 248.078218][ T31] kernel_clone+0x23f/0x940 [ 248.082745][ T31] ? fput+0x1a/0x20 [ 248.104501][ T31] ? bpf_prog_test_run+0x343/0x620 [ 248.109654][ T31] ? create_io_thread+0x130/0x130 [ 248.133919][ T31] ? security_bpf+0x82/0xa0 [ 248.138468][ T31] __x64_sys_clone+0x176/0x1d0 [ 248.148249][ T31] ? __ia32_sys_vfork+0xf0/0xf0 [ 248.534681][ T31] ? __kasan_check_write+0x14/0x20 [ 248.539886][ T31] ? switch_fpu_return+0x15d/0x2c0 [ 248.564210][ T31] x64_sys_call+0x41f/0x9a0 [ 248.568777][ T31] do_syscall_64+0x4c/0xa0 [ 248.583485][ T31] ? clear_bhb_loop+0x50/0xa0 [ 248.588225][ T31] ? clear_bhb_loop+0x50/0xa0 [ 248.593016][ T31] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 248.613940][ T31] RIP: 0033:0x7f3bd2c8fbe9 [ 248.618564][ T31] RSP: 002b:00007f3bd16b5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 248.653793][ T31] RAX: ffffffffffffffda RBX: 00007f3bd2ec7180 RCX: 00007f3bd2c8fbe9 [ 248.661907][ T31] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 248.703397][ T31] RBP: 00007f3bd2d12e19 R08: 0000000000000000 R09: 0000000000000000 [ 248.711412][ T31] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 248.734435][ T31] R13: 00007f3bd2ec7218 R14: 00007f3bd2ec7180 R15: 00007fffe8d8fe88 [ 248.742456][ T31] [ 248.763707][ T31] INFO: task syz.4.703:2801 blocked for more than 124 seconds. [ 248.771283][ T31] Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 248.803711][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 248.812424][ T31] task:syz.4.703 state:D stack:23472 pid: 2801 ppid: 281 flags:0x00004004 [ 248.844426][ T31] Call Trace: [ 248.847754][ T31] [ 248.850695][ T31] __schedule+0xb6e/0x14c0 [ 248.873271][ T31] ? release_firmware_map_entry+0x190/0x190 [ 248.879205][ T31] schedule+0x11e/0x1e0 [ 248.904519][ T31] schedule_preempt_disabled+0x13/0x20 [ 248.910045][ T31] __mutex_lock+0x7b6/0x11b0 [ 248.934458][ T31] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 248.941260][ T31] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 248.963453][ T31] ? waiting_for_supplier_show+0xa0/0xa0 [ 248.969218][ T31] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 248.994553][ T31] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 249.000935][ T31] ? mutex_lock+0x95/0x1a0 [ 249.007497][ T31] __mutex_lock_slowpath+0xe/0x10 [ 249.012722][ T31] mutex_lock+0x100/0x1a0 [ 249.033812][ T31] ? wait_for_completion_killable_timeout+0x10/0x10 [ 249.040451][ T31] ? list_netdevice+0x4c0/0x4c0 [ 249.064660][ T31] rtnl_lock+0x15/0x20 [ 249.068772][ T31] xfrmi_exit_batch_net+0xb0/0x250 [ 249.093396][ T31] ? xfrmi6_err+0x640/0x640 [ 249.097953][ T31] ? netns_bpf_pernet_pre_exit+0x1ff/0x210 [ 249.107178][ T31] ? xfrmi6_err+0x640/0x640 [ 249.111899][ T31] setup_net+0x731/0xa90 [ 249.133980][ T31] ? copy_net_ns+0x5c0/0x5c0 [ 249.138617][ T31] ? copy_net_ns+0x345/0x5c0 [ 249.153180][ T31] copy_net_ns+0x355/0x5c0 [ 249.157775][ T31] create_new_namespaces+0x3a2/0x660 [ 249.163073][ T31] copy_namespaces+0x1d1/0x220 [ 249.364044][ T31] ? copy_signal+0x4cb/0x600 [ 249.368765][ T31] copy_process+0x118d/0x3210 [ 249.393666][ T31] ? __pidfd_prepare+0x150/0x150 [ 249.398650][ T31] ? map_freeze+0x360/0x360 [ 249.414728][ T31] kernel_clone+0x23f/0x940 [ 249.419353][ T31] ? create_io_thread+0x130/0x130 [ 249.524028][ T31] ? security_bpf+0x82/0xa0 [ 249.528701][ T31] __x64_sys_clone+0x176/0x1d0 [ 249.554185][ T31] ? __ia32_sys_vfork+0xf0/0xf0 [ 249.559177][ T31] x64_sys_call+0x41f/0x9a0 [ 249.565787][ T31] do_syscall_64+0x4c/0xa0 [ 249.570226][ T31] ? clear_bhb_loop+0x50/0xa0 [ 249.593425][ T31] ? clear_bhb_loop+0x50/0xa0 [ 249.598146][ T31] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 249.623628][ T31] RIP: 0033:0x7f5196be2be9 [ 249.673184][ C0] net_ratelimit: 54675 callbacks suppressed [ 249.673204][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.688375][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 249.690323][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.690404][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.690482][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.690567][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.690645][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.690723][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.690812][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.690897][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.024580][ T31] RSP: 002b:00007f519564afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 250.033052][ T31] RAX: ffffffffffffffda RBX: 00007f5196e19fa0 RCX: 00007f5196be2be9 [ 250.064398][ T31] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 250.072417][ T31] RBP: 00007f5196c65e19 R08: 0000000000000000 R09: 0000000000000000 [ 250.094294][ T31] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 250.102486][ T31] R13: 00007f5196e1a038 R14: 00007f5196e19fa0 R15: 00007ffd2c4e3c18 [ 250.143152][ T31] [ 250.146274][ T31] INFO: task syz-executor:2832 blocked for more than 125 seconds. [ 250.173692][ T31] Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 250.182845][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 250.204014][ T31] task:syz-executor state:D stack:28192 pid: 2832 ppid: 1 flags:0x00004004 [ 250.614148][ T31] Call Trace: [ 250.617626][ T31] [ 250.620662][ T31] __schedule+0xb6e/0x14c0 [ 250.643363][ T31] ? release_firmware_map_entry+0x190/0x190 [ 250.649317][ T31] ? __mutex_add_waiter+0xc7/0x270 [ 250.664413][ T31] ? __kasan_check_write+0x14/0x20 [ 250.669561][ T31] ? __ww_mutex_check_waiters+0x350/0x350 [ 250.693382][ T31] schedule+0x11e/0x1e0 [ 250.697585][ T31] schedule_preempt_disabled+0x13/0x20 [ 250.703053][ T31] __mutex_lock+0x7b6/0x11b0 [ 250.724029][ T31] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 250.729873][ T31] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 250.759974][ T31] ? selinux_capable+0x29c/0x380 [ 250.772323][ T31] ? selinux_capset+0xf0/0xf0 [ 250.794912][ T31] ? htab_map_hash+0x36f/0x770 [ 250.799707][ T31] ? cap_capable+0x1aa/0x230 [ 250.824172][ T31] __mutex_lock_slowpath+0xe/0x10 [ 250.829258][ T31] mutex_lock+0x100/0x1a0 [ 250.835722][ T31] ? wait_for_completion_killable_timeout+0x10/0x10 [ 250.842436][ T31] ? ns_capable+0x8c/0xf0 [ 250.863260][ T31] ? netlink_net_capable+0x125/0x160 [ 250.868670][ T31] rtnetlink_rcv_msg+0x4af/0xb90 [ 250.894216][ T31] ? rtnetlink_bind+0x80/0x80 [ 250.898936][ T31] ? memcpy+0x56/0x70 [ 250.902930][ T31] ? avc_has_perm_noaudit+0x2f4/0x460 [ 250.923186][ T31] ? arch_stack_walk+0xee/0x140 [ 250.928271][ T31] ? avc_denied+0x1b0/0x1b0 [ 250.932790][ T31] ? stack_trace_save+0x98/0xe0 [ 250.954708][ T31] ? avc_has_perm+0x158/0x240 [ 250.959427][ T31] ? avc_has_perm_noaudit+0x460/0x460 [ 250.983788][ T31] ? do_syscall_64+0x4c/0xa0 [ 250.988512][ T31] ? selinux_nlmsg_lookup+0x400/0x4c0 [ 251.013606][ T31] netlink_rcv_skb+0x1e0/0x430 [ 251.018409][ T31] ? rtnetlink_bind+0x80/0x80 [ 251.023096][ T31] ? netlink_ack+0xb60/0xb60 [ 251.038846][ T31] ? __netlink_lookup+0x387/0x3b0 [ 251.053811][ T31] rtnetlink_rcv+0x1c/0x20 [ 251.058255][ T31] netlink_unicast+0x876/0xa40 [ 251.063031][ T31] netlink_sendmsg+0x86a/0xb70 [ 251.123283][ T31] ? netlink_getsockopt+0x530/0x530 [ 251.128618][ T31] ? security_socket_sendmsg+0x82/0xa0 [ 251.153763][ T31] __sys_sendto+0x423/0x580 [ 251.158426][ T31] ? __ia32_sys_getpeername+0x90/0x90 [ 251.184374][ T31] __x64_sys_sendto+0xe5/0x100 [ 251.189357][ T31] x64_sys_call+0x178/0x9a0 [ 251.213600][ T31] do_syscall_64+0x4c/0xa0 [ 251.218145][ T31] ? clear_bhb_loop+0x50/0xa0 [ 251.222934][ T31] ? clear_bhb_loop+0x50/0xa0 [ 251.230792][ T31] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 251.244352][ T31] RIP: 0033:0x7ff08a5b8a23 [ 251.248792][ T31] RSP: 002b:00007ffc2784eb58 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 251.263363][ T31] RAX: ffffffffffffffda RBX: 00007ff08b31c620 RCX: 00007ff08a5b8a23 [ 251.271357][ T31] RDX: 0000000000000028 RSI: 00007ff08b31c670 RDI: 0000000000000003 [ 251.283876][ T31] RBP: 0000000000000001 R08: 00007ffc2784eb74 R09: 000000000000000c [ 251.292057][ T31] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 251.304587][ T31] R13: 0000000000000000 R14: 00007ff08b31c670 R15: 0000000000000000 [ 251.312748][ T31] [ 251.463167][ T31] INFO: task syz-executor:2833 blocked for more than 127 seconds. [ 251.483717][ T31] Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 251.493082][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 251.523419][ T31] task:syz-executor state:D stack:28192 pid: 2833 ppid: 1 flags:0x00004004 [ 251.532753][ T31] Call Trace: [ 251.663586][ T31] [ 251.666564][ T31] __schedule+0xb6e/0x14c0 [ 251.683605][ T31] ? release_firmware_map_entry+0x190/0x190 [ 251.689960][ T31] ? __mutex_add_waiter+0xc7/0x270 [ 251.713297][ T31] ? __kasan_check_write+0x14/0x20 [ 251.720627][ T31] ? __ww_mutex_check_waiters+0x350/0x350 [ 251.743478][ T31] schedule+0x11e/0x1e0 [ 251.747692][ T31] schedule_preempt_disabled+0x13/0x20 [ 251.763242][ T31] __mutex_lock+0x7b6/0x11b0 [ 251.767871][ T31] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 251.793764][ T31] ? selinux_capable+0x29c/0x380 [ 251.798739][ T31] ? selinux_capset+0xf0/0xf0 [ 251.814454][ T31] ? __bpf_ringbuf_reserve+0x43a/0x4e0 [ 251.820097][ T31] ? cap_capable+0x1aa/0x230 [ 251.884367][ T31] __mutex_lock_slowpath+0xe/0x10 [ 251.889447][ T31] mutex_lock+0x100/0x1a0 [ 252.203183][ T31] ? wait_for_completion_killable_timeout+0x10/0x10 [ 252.209920][ T31] ? ns_capable+0x8c/0xf0 [ 252.254645][ T31] ? netlink_net_capable+0x125/0x160 [ 252.259978][ T31] rtnetlink_rcv_msg+0x4af/0xb90 [ 252.283761][ T31] ? rtnetlink_bind+0x80/0x80 [ 252.288706][ T31] ? memcpy+0x56/0x70 [ 252.292701][ T31] ? avc_has_perm_noaudit+0x2f4/0x460 [ 252.314438][ T31] ? arch_stack_walk+0xee/0x140 [ 252.319334][ T31] ? avc_denied+0x1b0/0x1b0 [ 252.343347][ T31] ? stack_trace_save+0x98/0xe0 [ 252.348248][ T31] ? avc_has_perm+0x158/0x240 [ 252.352937][ T31] ? avc_has_perm_noaudit+0x460/0x460 [ 252.374193][ T31] ? do_syscall_64+0x4c/0xa0 [ 252.378827][ T31] ? selinux_nlmsg_lookup+0x400/0x4c0 [ 252.403722][ T31] netlink_rcv_skb+0x1e0/0x430 [ 252.408522][ T31] ? rtnetlink_bind+0x80/0x80 [ 252.424195][ T31] ? netlink_ack+0xb60/0xb60 [ 252.428821][ T31] ? __netlink_lookup+0x387/0x3b0 [ 252.443763][ T31] rtnetlink_rcv+0x1c/0x20 [ 252.448220][ T31] netlink_unicast+0x876/0xa40 [ 252.452990][ T31] netlink_sendmsg+0x86a/0xb70 [ 252.474136][ T31] ? netlink_getsockopt+0x530/0x530 [ 252.479371][ T31] ? security_socket_sendmsg+0x82/0xa0 [ 252.504262][ T31] __sys_sendto+0x423/0x580 [ 252.508812][ T31] ? __ia32_sys_getpeername+0x90/0x90 [ 252.533215][ T31] __x64_sys_sendto+0xe5/0x100 [ 252.538024][ T31] x64_sys_call+0x178/0x9a0 [ 252.542630][ T31] do_syscall_64+0x4c/0xa0 [ 252.563907][ T31] ? clear_bhb_loop+0x50/0xa0 [ 252.568635][ T31] ? clear_bhb_loop+0x50/0xa0 [ 253.103898][ T31] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 253.109853][ T31] RIP: 0033:0x7f83cd8fea23 [ 253.133680][ T31] RSP: 002b:00007ffd681edb78 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 253.142236][ T31] RAX: ffffffffffffffda RBX: 00007f83ce662620 RCX: 00007f83cd8fea23 [ 253.163793][ T31] RDX: 0000000000000028 RSI: 00007f83ce662670 RDI: 0000000000000003 [ 253.171797][ T31] RBP: 0000000000000001 R08: 00007ffd681edb94 R09: 000000000000000c [ 253.194289][ T31] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 253.202319][ T31] R13: 0000000000000000 R14: 00007f83ce662670 R15: 0000000000000000 [ 253.233812][ T31] [ 253.236872][ T31] INFO: task syz-executor:2834 blocked for more than 128 seconds. [ 253.263861][ T31] Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 253.272995][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 253.303769][ T31] task:syz-executor state:D stack:28192 pid: 2834 ppid: 1 flags:0x00004004 [ 253.313061][ T31] Call Trace: [ 253.793557][ T31] [ 253.796543][ T31] __schedule+0xb6e/0x14c0 [ 253.801214][ T31] ? release_firmware_map_entry+0x190/0x190 [ 253.823476][ T31] ? __mutex_add_waiter+0xc7/0x270 [ 253.828711][ T31] ? __kasan_check_write+0x14/0x20 [ 253.853304][ T31] ? __ww_mutex_check_waiters+0x350/0x350 [ 253.859230][ T31] schedule+0x11e/0x1e0 [ 253.883629][ T31] schedule_preempt_disabled+0x13/0x20 [ 253.889145][ T31] __mutex_lock+0x7b6/0x11b0 [ 253.896913][ T31] ? slab_post_alloc_hook+0x4f/0x2b0 [ 253.902223][ T31] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 253.923756][ T31] ? selinux_capable+0x29c/0x380 [ 253.928726][ T31] ? selinux_capset+0xf0/0xf0 [ 254.003936][ T31] ? free_unref_page_commit+0x195/0x410 [ 254.009539][ T31] ? cap_capable+0x1aa/0x230 [ 254.024115][ T31] __mutex_lock_slowpath+0xe/0x10 [ 254.029361][ T31] mutex_lock+0x100/0x1a0 [ 254.054220][ T31] ? wait_for_completion_killable_timeout+0x10/0x10 [ 254.060945][ T31] ? ns_capable+0x8c/0xf0 [ 254.083174][ T31] ? netlink_net_capable+0x125/0x160 [ 254.088581][ T31] rtnetlink_rcv_msg+0x4af/0xb90 [ 254.114008][ T31] ? rtnetlink_bind+0x80/0x80 [ 254.118730][ T31] ? memcpy+0x56/0x70 [ 254.122729][ T31] ? avc_has_perm_noaudit+0x2f4/0x460 [ 254.144482][ T31] ? arch_stack_walk+0xee/0x140 [ 254.150077][ T31] ? avc_denied+0x1b0/0x1b0 [ 254.156716][ T31] ? stack_trace_save+0x98/0xe0 [ 254.161583][ T31] ? avc_has_perm+0x158/0x240 [ 254.184368][ T31] ? avc_has_perm_noaudit+0x460/0x460 [ 254.189843][ T31] ? do_syscall_64+0x4c/0xa0 [ 254.214053][ T31] ? selinux_nlmsg_lookup+0x400/0x4c0 [ 254.219496][ T31] netlink_rcv_skb+0x1e0/0x430 [ 254.226407][ T31] ? rtnetlink_bind+0x80/0x80 [ 254.231273][ T31] ? netlink_ack+0xb60/0xb60 [ 254.254712][ T31] ? __netlink_lookup+0x387/0x3b0 [ 254.259793][ T31] rtnetlink_rcv+0x1c/0x20 [ 254.283369][ T31] netlink_unicast+0x876/0xa40 [ 254.288285][ T31] netlink_sendmsg+0x86a/0xb70 [ 254.303393][ T31] ? netlink_getsockopt+0x530/0x530 [ 254.308754][ T31] ? security_socket_sendmsg+0x82/0xa0 [ 254.324361][ T31] __sys_sendto+0x423/0x580 [ 254.329235][ T31] ? __ia32_sys_getpeername+0x90/0x90 [ 254.353649][ T31] __x64_sys_sendto+0xe5/0x100 [ 254.358464][ T31] x64_sys_call+0x178/0x9a0 [ 254.373378][ T31] do_syscall_64+0x4c/0xa0 [ 254.377832][ T31] ? clear_bhb_loop+0x50/0xa0 [ 254.382637][ T31] ? clear_bhb_loop+0x50/0xa0 [ 254.403904][ T31] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 254.409846][ T31] RIP: 0033:0x7f54e7ff9a23 [ 254.433320][ T31] RSP: 002b:00007fff3536fd78 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 254.441954][ T31] RAX: ffffffffffffffda RBX: 00007f54e8d5d620 RCX: 00007f54e7ff9a23 [ 254.463317][ T31] RDX: 0000000000000028 RSI: 00007f54e8d5d670 RDI: 0000000000000003 [ 254.574548][ T31] RBP: 0000000000000001 R08: 00007fff3536fd94 R09: 000000000000000c [ 254.582563][ T31] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 254.624053][ T31] R13: 0000000000000000 R14: 00007f54e8d5d670 R15: 0000000000000000 [ 254.632172][ T31] [ 254.653749][ T31] INFO: task syz-executor:2835 blocked for more than 130 seconds. [ 254.661604][ T31] Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 254.683378][ C1] net_ratelimit: 34429 callbacks suppressed [ 254.683396][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 254.683778][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 254.689388][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 254.689478][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 254.689572][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 254.690467][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 254.690554][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 254.690642][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 254.690729][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 254.692750][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 254.804461][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 254.815308][ T31] task:syz-executor state:D stack:28192 pid: 2835 ppid: 1 flags:0x00004004 [ 254.826576][ T31] Call Trace: [ 254.829875][ T31] [ 254.832816][ T31] __schedule+0xb6e/0x14c0 [ 254.839435][ T31] ? release_firmware_map_entry+0x190/0x190 [ 254.847347][ T31] ? __mutex_add_waiter+0xc7/0x270 [ 254.852556][ T31] ? __kasan_check_write+0x14/0x20 [ 254.859724][ T31] ? __ww_mutex_check_waiters+0x350/0x350 [ 254.867528][ T31] schedule+0x11e/0x1e0 [ 254.871782][ T31] schedule_preempt_disabled+0x13/0x20 [ 254.879277][ T31] __mutex_lock+0x7b6/0x11b0 [ 254.885871][ T31] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 254.892647][ T31] ? selinux_capable+0x29c/0x380 [ 254.899570][ T31] ? selinux_capset+0xf0/0xf0 [ 254.906800][ T31] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 254.912658][ T31] ? mark_free_pages+0x660/0x660 [ 254.919772][ T31] ? cap_capable+0x1aa/0x230 [ 254.927670][ T31] __mutex_lock_slowpath+0xe/0x10 [ 254.933068][ T31] mutex_lock+0x100/0x1a0 [ 254.954379][ T31] ? wait_for_completion_killable_timeout+0x10/0x10 [ 254.961266][ T31] ? ns_capable+0x8c/0xf0 [ 255.274045][ T31] ? netlink_net_capable+0x125/0x160 [ 255.279738][ T31] rtnetlink_rcv_msg+0x4af/0xb90 [ 255.303679][ T31] ? rtnetlink_bind+0x80/0x80 [ 255.308484][ T31] ? memcpy+0x56/0x70 [ 255.312476][ T31] ? avc_has_perm_noaudit+0x2f4/0x460 [ 255.333897][ T31] ? arch_stack_walk+0xee/0x140 [ 255.338902][ T31] ? avc_denied+0x1b0/0x1b0 [ 255.353270][ T31] ? stack_trace_save+0x98/0xe0 [ 255.358245][ T31] ? avc_has_perm+0x158/0x240 [ 255.373342][ T31] ? avc_has_perm_noaudit+0x460/0x460 [ 255.379036][ T31] ? do_syscall_64+0x4c/0xa0 [ 255.404497][ T31] ? selinux_nlmsg_lookup+0x400/0x4c0 [ 255.410035][ T31] netlink_rcv_skb+0x1e0/0x430 [ 255.434113][ T31] ? rtnetlink_bind+0x80/0x80 [ 255.439249][ T31] ? netlink_ack+0xb60/0xb60 [ 255.445828][ T31] ? __netlink_lookup+0x387/0x3b0 [ 255.450877][ T31] rtnetlink_rcv+0x1c/0x20 [ 255.458351][ T31] netlink_unicast+0x876/0xa40 [ 255.473582][ T31] netlink_sendmsg+0x86a/0xb70 [ 255.478493][ T31] ? netlink_getsockopt+0x530/0x530 [ 255.493565][ T31] ? security_socket_sendmsg+0x82/0xa0 [ 255.499170][ T31] __sys_sendto+0x423/0x580 [ 255.514836][ T31] ? __ia32_sys_getpeername+0x90/0x90 [ 255.520248][ T31] __x64_sys_sendto+0xe5/0x100 [ 255.534236][ T31] x64_sys_call+0x178/0x9a0 [ 255.538778][ T31] do_syscall_64+0x4c/0xa0 [ 255.554506][ T31] ? clear_bhb_loop+0x50/0xa0 [ 255.559250][ T31] ? clear_bhb_loop+0x50/0xa0 [ 255.573255][ T31] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 255.579271][ T31] RIP: 0033:0x7f2ea22fea23 [ 255.593191][ T31] RSP: 002b:00007ffc6cbc8458 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 255.601631][ T31] RAX: ffffffffffffffda RBX: 00007f2ea3062620 RCX: 00007f2ea22fea23 [ 255.613498][ T31] RDX: 0000000000000028 RSI: 00007f2ea3062670 RDI: 0000000000000003 [ 255.621603][ T31] RBP: 0000000000000001 R08: 00007ffc6cbc8474 R09: 000000000000000c [ 255.633448][ T31] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 255.641536][ T31] R13: 0000000000000000 R14: 00007f2ea3062670 R15: 0000000000000000 [ 255.653509][ T31] [ 255.833493][ T31] INFO: task syz-executor:2837 blocked for more than 131 seconds. [ 255.879892][ T31] Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 255.904662][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 255.916470][ T31] task:syz-executor state:D stack:28192 pid: 2837 ppid: 1 flags:0x00004004 [ 255.943953][ T31] Call Trace: [ 255.947280][ T31] [ 255.950316][ T31] __schedule+0xb6e/0x14c0 [ 255.973311][ T31] ? release_firmware_map_entry+0x190/0x190 [ 255.979365][ T31] ? __mutex_add_waiter+0xc7/0x270 [ 256.004130][ T31] ? __kasan_check_write+0x14/0x20 [ 256.009284][ T31] ? __ww_mutex_check_waiters+0x350/0x350 [ 256.063707][ T31] schedule+0x11e/0x1e0 [ 256.067911][ T31] schedule_preempt_disabled+0x13/0x20 [ 256.094238][ T31] __mutex_lock+0x7b6/0x11b0 [ 256.098874][ T31] ? slab_post_alloc_hook+0x4f/0x2b0 [ 256.123314][ T31] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 256.130486][ T31] ? selinux_capable+0x29c/0x380 [ 256.153625][ T31] ? selinux_capset+0xf0/0xf0 [ 256.158345][ T31] ? free_unref_page_commit+0x195/0x410 [ 256.166060][ T31] ? cap_capable+0x1aa/0x230 [ 256.170843][ T31] __mutex_lock_slowpath+0xe/0x10 [ 256.194443][ T31] mutex_lock+0x100/0x1a0 [ 256.198837][ T31] ? wait_for_completion_killable_timeout+0x10/0x10 [ 256.224414][ T31] ? ns_capable+0x8c/0xf0 [ 256.228788][ T31] ? netlink_net_capable+0x125/0x160 [ 256.253780][ T31] rtnetlink_rcv_msg+0x4af/0xb90 [ 256.258856][ T31] ? rtnetlink_bind+0x80/0x80 [ 256.266834][ T31] ? memcpy+0x56/0x70 [ 256.270852][ T31] ? avc_has_perm_noaudit+0x2f4/0x460 [ 256.294099][ T31] ? arch_stack_walk+0xee/0x140 [ 256.299167][ T31] ? avc_denied+0x1b0/0x1b0 [ 256.323463][ T31] ? stack_trace_save+0x98/0xe0 [ 256.328446][ T31] ? avc_has_perm+0x158/0x240 [ 256.336420][ T31] ? avc_has_perm_noaudit+0x460/0x460 [ 256.341825][ T31] ? do_syscall_64+0x4c/0xa0 [ 258.403894][ T31] ? selinux_nlmsg_lookup+0x400/0x4c0 [ 258.409425][ T31] netlink_rcv_skb+0x1e0/0x430 [ 258.424234][ T31] ? rtnetlink_bind+0x80/0x80 [ 258.428975][ T31] ? netlink_ack+0xb60/0xb60 [ 258.443584][ T31] ? __netlink_lookup+0x387/0x3b0 [ 258.448652][ T31] rtnetlink_rcv+0x1c/0x20 [ 258.463834][ T31] netlink_unicast+0x876/0xa40 [ 258.468617][ T31] netlink_sendmsg+0x86a/0xb70 [ 258.483997][ T31] ? netlink_getsockopt+0x530/0x530 [ 258.489308][ T31] ? security_socket_sendmsg+0x82/0xa0 [ 258.503946][ T31] __sys_sendto+0x423/0x580 [ 258.508663][ T31] ? __ia32_sys_getpeername+0x90/0x90 [ 258.523192][ T31] __x64_sys_sendto+0xe5/0x100 [ 258.527987][ T31] x64_sys_call+0x178/0x9a0 [ 258.532603][ T31] do_syscall_64+0x4c/0xa0 [ 258.544562][ T31] ? clear_bhb_loop+0x50/0xa0 [ 258.549255][ T31] ? clear_bhb_loop+0x50/0xa0 [ 258.564327][ T31] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 258.570433][ T31] RIP: 0033:0x7f1d267eca23 [ 258.584063][ T31] RSP: 002b:00007ffd4797a428 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 258.592601][ T31] RAX: ffffffffffffffda RBX: 00007f1d27550620 RCX: 00007f1d267eca23 [ 258.603697][ T31] RDX: 0000000000000028 RSI: 00007f1d27550670 RDI: 0000000000000003 [ 258.611696][ T31] RBP: 0000000000000001 R08: 00007ffd4797a444 R09: 000000000000000c [ 258.624564][ T31] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 258.632593][ T31] R13: 0000000000000000 R14: 00007f1d27550670 R15: 0000000000000000 [ 258.643743][ T31] [ 259.341032][ T31] NMI backtrace for cpu 0 [ 259.345423][ T31] CPU: 0 PID: 31 Comm: khungtaskd Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 259.356891][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 259.367182][ T31] Call Trace: [ 259.370478][ T31] [ 259.373473][ T31] __dump_stack+0x21/0x30 [ 259.377824][ T31] dump_stack_lvl+0xee/0x150 [ 259.382434][ T31] ? show_regs_print_info+0x20/0x20 [ 259.387655][ T31] dump_stack+0x15/0x20 [ 259.391820][ T31] nmi_cpu_backtrace+0x2b4/0x2c0 [ 259.396772][ T31] ? rcu_read_unlock_special+0xab/0x460 [ 259.402334][ T31] ? nmi_trigger_cpumask_backtrace+0x240/0x240 [ 259.408677][ T31] ? __rcu_read_unlock+0xa0/0xa0 [ 259.413653][ T31] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 259.419826][ T31] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 259.426084][ T31] nmi_trigger_cpumask_backtrace+0x138/0x240 [ 259.432085][ T31] arch_trigger_cpumask_backtrace+0x10/0x20 [ 259.437985][ T31] watchdog+0xd64/0xea0 [ 259.442158][ T31] ? hungtask_pm_notify+0x50/0x50 [ 259.447197][ T31] ? __kasan_check_read+0x11/0x20 [ 259.452340][ T31] ? __kthread_parkme+0xac/0x200 [ 259.457411][ T31] ? preempt_count_add+0x90/0x1b0 [ 259.462547][ T31] kthread+0x411/0x500 [ 259.466629][ T31] ? hungtask_pm_notify+0x50/0x50 [ 259.471683][ T31] ? kthread_blkcg+0xd0/0xd0 [ 259.476380][ T31] ret_from_fork+0x1f/0x30 [ 259.480820][ T31] [ 259.485665][ T31] Sending NMI from CPU 0 to CPUs 1: [ 259.490894][ C1] NMI backtrace for cpu 1 [ 259.490906][ C1] CPU: 1 PID: 557 Comm: kworker/1:7 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 259.490924][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 259.490932][ C1] Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker [ 259.490954][ C1] RIP: 0010:ip6_route_input+0x5a8/0x820 [ 259.490974][ C1] Code: 08 4c 89 fe 48 89 da 49 c7 c0 30 42 21 84 e8 bf 7b 0b 00 49 89 c6 48 81 c3 82 00 00 00 49 89 dd 49 c1 ed 03 43 0f b6 44 25 00 <84> c0 49 89 df 4c 89 e3 0f 85 94 01 00 00 4d 85 f6 41 0f 95 c4 4c [ 259.490987][ C1] RSP: 0018:ffffc900001d0320 EFLAGS: 00000a02 [ 259.490999][ C1] RAX: 0000000000000000 RBX: ffff88814cd531c2 RCX: ffff888116370000 [ 259.491010][ C1] RDX: 0000000000000100 RSI: 0000000000000000 RDI: 000000000000fff5 [ 259.491020][ C1] RBP: ffffc900001d04d8 R08: 0000000000000000 R09: ffff88814cd53140 [ 259.491030][ C1] R10: fffff5200003a022 R11: 1ffff9200003a01e R12: dffffc0000000000 [ 259.491041][ C1] R13: 1ffff110299aa638 R14: ffff8881294a5b40 R15: ffffc900001d0380 [ 259.491052][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 259.491066][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 259.491077][ C1] CR2: 00007fccb350e72a CR3: 000000011de5e000 CR4: 00000000003506a0 [ 259.491092][ C1] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 259.491102][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 259.491111][ C1] Call Trace: [ 259.491115][ C1] [ 259.491122][ C1] ? ip6_multipath_l3_keys+0x5f0/0x5f0 [ 259.491139][ C1] ? stack_trace_save+0x98/0xe0 [ 259.491156][ C1] ? ip6table_mangle_table_init+0x60/0x60 [ 259.491171][ C1] ip6_rcv_finish+0x156/0x360 [ 259.491187][ C1] ipv6_rcv+0xe9/0x210 [ 259.491201][ C1] ? ip6_rcv_finish+0x360/0x360 [ 259.491216][ C1] ? refcount_add+0x80/0x80 [ 259.491231][ C1] ? br_forward_finish+0xcc/0x210 [ 259.491247][ C1] ? ip6_rcv_finish+0x360/0x360 [ 259.491261][ C1] __netif_receive_skb+0xc8/0x280 [ 259.491279][ C1] netif_receive_skb+0x98/0x3d0 [ 259.491292][ C1] ? netif_receive_skb_core+0x100/0x100 [ 259.491305][ C1] ? __br_forward+0x3cd/0x4f0 [ 259.491320][ C1] ? br_forward+0x300/0x300 [ 259.491336][ C1] br_pass_frame_up+0x238/0x410 [ 259.491352][ C1] ? br_multicast_is_router+0x1a0/0x1a0 [ 259.491368][ C1] ? br_flood+0x3cf/0x420 [ 259.491384][ C1] br_handle_frame_finish+0xdd6/0x1200 [ 259.491402][ C1] ? brport_get_ownership+0x80/0x80 [ 259.491418][ C1] ? kfree_skbmem+0x10c/0x180 [ 259.491435][ C1] ? bpf_trace_run3+0xd1/0x1e0 [ 259.491450][ C1] br_handle_frame+0x8fc/0xf50 [ 259.491467][ C1] ? br_get_rx_handler+0x20/0x20 [ 259.491483][ C1] ? kmem_cache_free+0x2f8/0x320 [ 259.491498][ C1] ? skb_release_data+0x1c6/0xa10 [ 259.491514][ C1] ? br_get_rx_handler+0x20/0x20 [ 259.491529][ C1] __netif_receive_skb_core+0xe49/0x2f10 [ 259.491545][ C1] ? ip6_mc_input+0x235/0x2a0 [ 259.491561][ C1] ? set_rps_cpu+0x5d0/0x5d0 [ 259.491574][ C1] ? ipv6_rcv+0xe9/0x210 [ 259.491588][ C1] ? ip6_rcv_finish+0x360/0x360 [ 259.491603][ C1] ? refcount_add+0x80/0x80 [ 259.491618][ C1] ? __kasan_check_write+0x14/0x20 [ 259.491632][ C1] ? _raw_spin_lock+0x8e/0xe0 [ 259.491647][ C1] __netif_receive_skb+0x72/0x280 [ 259.491663][ C1] process_backlog+0x368/0x600 [ 259.491680][ C1] __napi_poll+0xbe/0x590 [ 259.491695][ C1] net_rx_action+0x371/0x8e0 [ 259.491719][ C1] ? net_tx_action+0x520/0x520 [ 259.491733][ C1] ? sched_clock_cpu+0x18/0x3c0 [ 259.491746][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 259.491762][ C1] ? irqtime_account_irq+0x76/0x390 [ 259.491777][ C1] handle_softirqs+0x250/0x560 [ 259.491794][ C1] __do_softirq+0xb/0xd [ 259.491809][ C1] do_softirq+0xc6/0x120 [ 259.491822][ C1] [ 259.491826][ C1] [ 259.491831][ C1] ? __local_bh_enable_ip+0x80/0x80 [ 259.491845][ C1] ? _raw_spin_lock_bh+0x8e/0xe0 [ 259.491859][ C1] ? _raw_spin_lock_irq+0xe0/0xe0 [ 259.491874][ C1] __local_bh_enable_ip+0x75/0x80 [ 259.491888][ C1] _raw_spin_unlock_bh+0x51/0x60 [ 259.491902][ C1] wg_packet_decrypt_worker+0xce6/0xd80 [ 259.491918][ C1] ? ac6_seq_show+0xf0/0xf0 [ 259.491934][ C1] ? wg_packet_rx_poll+0x1a10/0x1a10 [ 259.491949][ C1] ? ip6_local_out+0x21a/0x3d0 [ 259.491966][ C1] ? dst_output+0x80/0x80 [ 259.491981][ C1] ? __ip6_local_out+0x350/0x350 [ 259.491997][ C1] ? udp6_set_csum+0x35f/0x5f0 [ 259.492014][ C1] ? udp_tunnel6_xmit_skb+0x5aa/0x860 [ 259.492030][ C1] ? __local_bh_enable_ip+0x58/0x80 [ 259.492044][ C1] ? local_bh_enable+0x1f/0x30 [ 259.492058][ C1] ? send6+0x491/0x640 [ 259.492073][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 259.492090][ C1] ? do_softirq+0xd3/0x120 [ 259.492104][ C1] ? __kasan_check_write+0x14/0x20 [ 259.492118][ C1] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 259.492133][ C1] ? _raw_spin_lock+0xe0/0xe0 [ 259.492146][ C1] ? do_softirq+0xd3/0x120 [ 259.492160][ C1] ? __local_bh_enable_ip+0x58/0x80 [ 259.492176][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 259.492190][ C1] ? try_to_wake_up+0x611/0x1160 [ 259.492205][ C1] ? __kasan_check_write+0x14/0x20 [ 259.492220][ C1] process_one_work+0x6be/0xba0 [ 259.492239][ C1] worker_thread+0xa59/0x1200 [ 259.492257][ C1] ? __kthread_parkme+0xac/0x200 [ 259.492272][ C1] kthread+0x411/0x500 [ 259.492285][ C1] ? worker_clr_flags+0x190/0x190 [ 259.492300][ C1] ? kthread_blkcg+0xd0/0xd0 [ 259.492314][ C1] ret_from_fork+0x1f/0x30 [ 259.492331][ C1] [ 259.693722][ C1] net_ratelimit: 31654 callbacks suppressed [ 259.693739][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 259.694183][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.699133][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 259.704829][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.709527][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 259.714034][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.719183][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 259.724581][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.729052][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 259.734483][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 264.703459][ C1] net_ratelimit: 26183 callbacks suppressed [ 264.703478][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 264.703719][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 264.709573][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 264.709649][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 264.709884][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 264.709966][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 264.710677][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 264.710751][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 264.710831][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 264.711070][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 269.713497][ C1] net_ratelimit: 27356 callbacks suppressed [ 269.713516][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 269.714259][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 269.719573][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 269.719655][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 269.720091][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 269.720189][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 269.720949][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 269.733398][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 269.743237][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 269.743318][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 274.723318][ C1] net_ratelimit: 40685 callbacks suppressed [ 274.723338][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 274.723620][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 274.729433][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 274.729513][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 274.730071][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 274.730150][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 274.730903][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 274.744409][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 274.753176][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 274.753256][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 279.733135][ C0] net_ratelimit: 27518 callbacks suppressed [ 279.733157][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 279.750584][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 279.754251][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 279.761785][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 279.761871][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 279.761947][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 279.762023][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 279.762098][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 279.762179][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 279.762264][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.836355][ T31] INFO: task syz.1.701:2796 blocked for more than 157 seconds. [ 281.984102][ T31] Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 282.003361][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 282.012228][ T31] task:syz.1.701 state:D stack:25608 pid: 2796 ppid: 282 flags:0x00004004 [ 282.065781][ T31] Call Trace: [ 282.069201][ T31] [ 282.072148][ T31] __schedule+0xb6e/0x14c0 [ 282.100935][ T31] ? release_firmware_map_entry+0x190/0x190 [ 282.123321][ T31] ? __mutex_add_waiter+0xc7/0x270 [ 282.156387][ T31] ? __kasan_check_write+0x14/0x20 [ 282.161635][ T31] ? __ww_mutex_check_waiters+0x350/0x350 [ 282.198028][ T31] schedule+0x11e/0x1e0 [ 282.202669][ T31] schedule_preempt_disabled+0x13/0x20 [ 282.236946][ T31] __mutex_lock+0x7b6/0x11b0 [ 282.241610][ T31] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 282.303645][ T31] ? clear_inode+0x107/0x150 [ 282.308376][ T31] ? sock_alloc_inode+0xb0/0xb0 [ 282.333256][ T31] ? evict+0x7da/0x870 [ 282.337499][ T31] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 282.366152][ T31] ? proc_nr_inodes+0x310/0x310 [ 282.371133][ T31] ? _raw_spin_lock+0x8e/0xe0 [ 282.403642][ T31] __mutex_lock_slowpath+0xe/0x10 [ 282.408721][ T31] mutex_lock+0x100/0x1a0 [ 282.413059][ T31] ? wait_for_completion_killable_timeout+0x10/0x10 [ 282.473589][ T31] rtnl_lock+0x15/0x20 [ 282.477709][ T31] bpf_exit_net+0x32/0x150 [ 282.482129][ T31] ? bpf_init_net+0x1f0/0x1f0 [ 282.523975][ T31] setup_net+0x731/0xa90 [ 282.528259][ T31] ? copy_net_ns+0x5c0/0x5c0 [ 282.533067][ T31] copy_net_ns+0x355/0x5c0 [ 282.573802][ T31] create_new_namespaces+0x3a2/0x660 [ 282.579147][ T31] copy_namespaces+0x1d1/0x220 [ 282.603499][ T31] ? copy_signal+0x4cb/0x600 [ 282.608127][ T31] copy_process+0x118d/0x3210 [ 282.612820][ T31] ? __pidfd_prepare+0x150/0x150 [ 282.773167][ T31] ? __fget_files+0x2c4/0x320 [ 282.778060][ T31] kernel_clone+0x23f/0x940 [ 282.782588][ T31] ? fput+0x1a/0x20 [ 282.825508][ T31] ? bpf_prog_test_run+0x343/0x620 [ 282.830781][ T31] ? create_io_thread+0x130/0x130 [ 282.856021][ T31] ? security_bpf+0x82/0xa0 [ 282.860575][ T31] __x64_sys_clone+0x176/0x1d0 [ 282.904699][ T31] ? __ia32_sys_vfork+0xf0/0xf0 [ 282.909707][ T31] ? __kasan_check_write+0x14/0x20 [ 282.947160][ T31] ? switch_fpu_return+0x15d/0x2c0 [ 282.952324][ T31] x64_sys_call+0x41f/0x9a0 [ 282.996021][ T31] do_syscall_64+0x4c/0xa0 [ 283.000609][ T31] ? clear_bhb_loop+0x50/0xa0 [ 283.034699][ T31] ? clear_bhb_loop+0x50/0xa0 [ 283.039425][ T31] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 283.064312][ T31] RIP: 0033:0x7f3bd2c8fbe9 [ 283.074337][ T31] RSP: 002b:00007f3bd16b5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 283.082886][ T31] RAX: ffffffffffffffda RBX: 00007f3bd2ec7180 RCX: 00007f3bd2c8fbe9 [ 283.094672][ T31] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 283.102843][ T31] RBP: 00007f3bd2d12e19 R08: 0000000000000000 R09: 0000000000000000 [ 283.114321][ T31] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 283.122309][ T31] R13: 00007f3bd2ec7218 R14: 00007f3bd2ec7180 R15: 00007fffe8d8fe88 [ 283.133950][ T31] [ 284.743118][ C0] net_ratelimit: 59327 callbacks suppressed [ 284.743139][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.754861][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 284.760512][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.760593][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.760671][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.760748][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.760832][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.760910][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.760988][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.761066][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.045103][ T31] INFO: task syz.4.703:2801 blocked for more than 161 seconds. [ 286.052891][ T31] Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 288.584726][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 289.545375][ T31] task:syz.4.703 state:D stack:23472 pid: 2801 ppid: 281 flags:0x00004004 [ 289.564839][ T31] Call Trace: [ 289.568233][ T31] [ 289.571178][ T31] __schedule+0xb6e/0x14c0 [ 289.584848][ T31] ? release_firmware_map_entry+0x190/0x190 [ 289.590878][ T31] schedule+0x11e/0x1e0 [ 289.604375][ T31] schedule_preempt_disabled+0x13/0x20 [ 289.609947][ T31] __mutex_lock+0x7b6/0x11b0 [ 289.624359][ T31] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 289.631267][ T31] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 289.643537][ T31] ? waiting_for_supplier_show+0xa0/0xa0 [ 289.649310][ T31] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 289.664915][ T31] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 289.671146][ T31] ? mutex_lock+0x95/0x1a0 [ 289.684955][ T31] __mutex_lock_slowpath+0xe/0x10 [ 289.690098][ T31] mutex_lock+0x100/0x1a0 [ 289.703787][ T31] ? wait_for_completion_killable_timeout+0x10/0x10 [ 289.710391][ T31] ? list_netdevice+0x4c0/0x4c0 [ 289.724498][ T31] rtnl_lock+0x15/0x20 [ 289.728603][ T31] xfrmi_exit_batch_net+0xb0/0x250 [ 289.744890][ T31] ? xfrmi6_err+0x640/0x640 [ 289.749511][ T31] ? netns_bpf_pernet_pre_exit+0x1ff/0x210 [ 289.755644][ C1] net_ratelimit: 71545 callbacks suppressed [ 289.755659][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 289.755755][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 289.755847][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 289.756300][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 289.756389][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 289.757218][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 289.757308][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 289.757392][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 289.757859][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 289.757942][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 289.963930][ T31] ? xfrmi6_err+0x640/0x640 [ 289.968551][ T31] setup_net+0x731/0xa90 [ 289.972818][ T31] ? copy_net_ns+0x5c0/0x5c0 [ 289.984871][ T31] ? copy_net_ns+0x345/0x5c0 [ 289.989483][ T31] copy_net_ns+0x355/0x5c0 [ 290.003211][ T31] create_new_namespaces+0x3a2/0x660 [ 290.008609][ T31] copy_namespaces+0x1d1/0x220 [ 290.024585][ T31] ? copy_signal+0x4cb/0x600 [ 290.029198][ T31] copy_process+0x118d/0x3210 [ 290.043138][ T31] ? __pidfd_prepare+0x150/0x150 [ 290.048110][ T31] ? map_freeze+0x360/0x360 [ 290.052623][ T31] kernel_clone+0x23f/0x940 [ 290.064581][ T31] ? create_io_thread+0x130/0x130 [ 290.073501][ T31] ? security_bpf+0x82/0xa0 [ 290.078113][ T31] __x64_sys_clone+0x176/0x1d0 [ 290.082892][ T31] ? __ia32_sys_vfork+0xf0/0xf0 [ 290.093435][ T31] x64_sys_call+0x41f/0x9a0 [ 290.097952][ T31] do_syscall_64+0x4c/0xa0 [ 290.102373][ T31] ? clear_bhb_loop+0x50/0xa0 [ 290.114509][ T31] ? clear_bhb_loop+0x50/0xa0 [ 290.119205][ T31] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 290.134425][ T31] RIP: 0033:0x7f5196be2be9 [ 290.138858][ T31] RSP: 002b:00007f519564afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 290.154867][ T31] RAX: ffffffffffffffda RBX: 00007f5196e19fa0 RCX: 00007f5196be2be9 [ 290.162863][ T31] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 290.174620][ T31] RBP: 00007f5196c65e19 R08: 0000000000000000 R09: 0000000000000000 [ 290.182603][ T31] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 290.194359][ T31] R13: 00007f5196e1a038 R14: 00007f5196e19fa0 R15: 00007ffd2c4e3c18 [ 290.202347][ T31] [ 291.063254][ T31] INFO: task syz.0.708:2828 blocked for more than 125 seconds. [ 291.097973][ T31] Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 291.140062][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 291.195294][ T31] task:syz.0.708 state:D stack:25664 pid: 2828 ppid: 283 flags:0x00004006 [ 291.274522][ T31] Call Trace: [ 291.277946][ T31] [ 291.280888][ T31] __schedule+0xb6e/0x14c0 [ 291.347635][ T31] ? release_firmware_map_entry+0x190/0x190 [ 291.459203][ T31] ? __mutex_add_waiter+0xc7/0x270 [ 291.477531][ T31] ? __kasan_check_write+0x14/0x20 [ 291.482692][ T31] ? __ww_mutex_check_waiters+0x350/0x350 [ 292.045298][ T31] schedule+0x11e/0x1e0 [ 292.049696][ T31] schedule_preempt_disabled+0x13/0x20 [ 292.225242][ T31] __mutex_lock+0x7b6/0x11b0 [ 292.229885][ T31] ? locks_remove_file+0x312/0xf40 [ 292.335223][ T31] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 292.342049][ T31] ? locks_remove_posix+0x520/0x520 [ 292.433851][ T31] ? memset+0x35/0x40 [ 292.437886][ T31] __mutex_lock_slowpath+0xe/0x10 [ 292.442920][ T31] mutex_lock+0x100/0x1a0 [ 292.753495][ T31] ? wait_for_completion_killable_timeout+0x10/0x10 [ 292.760148][ T31] rtnl_lock+0x15/0x20 [ 292.884657][ T31] tun_chr_close+0x40/0x140 [ 292.889313][ T31] ? tun_chr_open+0x540/0x540 [ 292.904295][ T31] __fput+0x20b/0x8b0 [ 292.908406][ T31] ____fput+0x15/0x20 [ 292.912597][ T31] task_work_run+0x127/0x190 [ 292.934732][ T31] do_exit+0xa7e/0x27a0 [ 292.938958][ T31] ? visit_groups_merge+0xd53/0xd90 [ 292.963491][ T31] ? put_task_struct+0x90/0x90 [ 292.968307][ T31] ? irqentry_exit_cond_resched+0x29/0x30 [ 292.993920][ T31] ? irqentry_exit+0x37/0x40 [ 292.998554][ T31] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 293.024254][ T31] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 293.030547][ T31] do_group_exit+0x141/0x310 [ 293.038327][ T31] ? get_signal+0x331/0x1480 [ 293.042957][ T31] get_signal+0x66a/0x1480 [ 293.094207][ T31] arch_do_signal_or_restart+0xc1/0x10f0 [ 293.099971][ T31] ? compat_start_thread+0x20/0x20 [ 293.123322][ T31] ? perf_sched_cb_inc+0x240/0x240 [ 293.128569][ T31] ? _raw_spin_unlock+0x4d/0x70 [ 293.153192][ T31] ? finish_task_switch+0x16b/0x780 [ 293.254622][ T31] ? __switch_to_asm+0x3a/0x60 [ 293.259494][ T31] ? get_sigframe_size+0x10/0x10 [ 293.283393][ T31] ? __schedule+0xb76/0x14c0 [ 293.288042][ T31] exit_to_user_mode_loop+0xa7/0xe0 [ 293.314541][ T31] exit_to_user_mode_prepare+0x5a/0xa0 [ 293.320167][ T31] irqentry_exit_to_user_mode+0x9/0x10 [ 293.329076][ T31] irqentry_exit+0x12/0x40 [ 293.343418][ T31] sysvec_apic_timer_interrupt+0x64/0xc0 [ 293.349180][ T31] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 293.373392][ T31] RIP: 0033:0x7fff485f8855 [ 293.377844][ T31] RSP: 002b:00007f81ba28c048 EFLAGS: 00000206 [ 293.403943][ T31] RAX: 0000000000000000 RBX: 0000000000000009 RCX: 000000000000006d [ 293.411951][ T31] RDX: 0000003921b4b1cc RSI: 00007f81ba28c0b0 RDI: 00000000111b892b [ 293.453618][ T31] RBP: 00007f81bb8b8b64 R08: 000000000000006d R09: 00101d678db3fa0a [ 293.461622][ T31] R10: 000000391f859b2b R11: 0000000000004a94 R12: 0000000000000000 [ 293.503413][ T31] R13: 00007f81bba5b038 R14: 00007f81bba5afa0 R15: 00007fff48547be8 [ 293.511441][ T31] [ 294.763126][ C1] net_ratelimit: 15401 callbacks suppressed [ 294.763147][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 294.763248][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.769476][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 294.769564][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 294.770282][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 294.770358][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 294.770433][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 294.770837][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 294.770913][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 294.771634][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 299.773116][ C0] net_ratelimit: 39656 callbacks suppressed [ 299.773135][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.790260][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.801460][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.801981][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 299.812838][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.812927][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.813006][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.813115][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.813194][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.823123][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.633531][ T31] NMI backtrace for cpu 0 [ 304.637909][ T31] CPU: 0 PID: 31 Comm: khungtaskd Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 304.649511][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 304.659662][ T31] Call Trace: [ 304.662942][ T31] [ 304.665879][ T31] __dump_stack+0x21/0x30 [ 304.670317][ T31] dump_stack_lvl+0xee/0x150 [ 304.674925][ T31] ? show_regs_print_info+0x20/0x20 [ 304.680133][ T31] dump_stack+0x15/0x20 [ 304.684296][ T31] nmi_cpu_backtrace+0x2b4/0x2c0 [ 304.689525][ T31] ? rcu_read_unlock_special+0xab/0x460 [ 304.695080][ T31] ? nmi_trigger_cpumask_backtrace+0x240/0x240 [ 304.701249][ T31] ? __rcu_read_unlock+0xa0/0xa0 [ 304.706393][ T31] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 304.712478][ T31] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 304.718563][ T31] nmi_trigger_cpumask_backtrace+0x138/0x240 [ 304.724564][ T31] arch_trigger_cpumask_backtrace+0x10/0x20 [ 304.730557][ T31] watchdog+0xd64/0xea0 [ 304.734907][ T31] ? hungtask_pm_notify+0x50/0x50 [ 304.740125][ T31] ? __kasan_check_read+0x11/0x20 [ 304.745158][ T31] ? __kthread_parkme+0xac/0x200 [ 304.750100][ T31] ? preempt_count_add+0x90/0x1b0 [ 304.755135][ T31] kthread+0x411/0x500 [ 304.759212][ T31] ? hungtask_pm_notify+0x50/0x50 [ 304.764243][ T31] ? kthread_blkcg+0xd0/0xd0 [ 304.768836][ T31] ret_from_fork+0x1f/0x30 [ 304.773265][ T31] [ 304.777772][ T31] Sending NMI from CPU 0 to CPUs 1: [ 304.782984][ C1] NMI backtrace for cpu 1 [ 304.782997][ C1] CPU: 1 PID: 2790 Comm: syz.3.699 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 304.783015][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 304.783023][ C1] RIP: 0010:asm_sysvec_apic_timer_interrupt+0x3/0x20 [ 304.783047][ C1] Code: e2 ff e9 b0 04 00 00 0f 01 ca fc 6a ff e8 b5 03 00 00 48 89 c4 48 8d 6c 24 01 48 89 e7 e8 25 de e2 ff e9 90 04 00 00 0f 01 ca 6a ff e8 95 03 00 00 48 89 c4 48 8d 6c 24 01 48 89 e7 e8 65 dc [ 304.783059][ C1] RSP: 0018:ffffc900001d01d8 EFLAGS: 00000046 [ 304.783073][ C1] RAX: ffffffff83b87c5d RBX: 0000000000000000 RCX: ffff88811247cf00 [ 304.783084][ C1] RDX: 0000000000000100 RSI: 0000000000000000 RDI: 000000000000000f [ 304.783093][ C1] RBP: ffffc900001d0208 R08: dffffc0000000000 R09: ffffed1024fea008 [ 304.783106][ C1] R10: ffffed1024fea008 R11: 1ffff11024fea007 R12: ffff888127e9c0d0 [ 304.783119][ C1] R13: dffffc0000000000 R14: ffff88815e2d3b40 R15: 0000000000000000 [ 304.783131][ C1] FS: 00007ffb91c976c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 304.783147][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 304.783159][ C1] CR2: 00007fccb35a4944 CR3: 000000011de5e000 CR4: 00000000003506a0 [ 304.783177][ C1] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 304.783188][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 304.783198][ C1] Call Trace: [ 304.783203][ C1] [ 304.783208][ C1] ? __sanitizer_cov_trace_const_cmp4+0x82/0x90 [ 304.783231][ C1] dev_hard_start_xmit+0x31d/0x670 [ 304.783251][ C1] __dev_queue_xmit+0x17bd/0x2d80 [ 304.783265][ C1] ? irqtime_account_irq+0xbe/0x390 [ 304.783286][ C1] ? dev_queue_xmit+0x20/0x20 [ 304.783302][ C1] ? __stack_depot_save+0x89/0x480 [ 304.783321][ C1] ? __stack_depot_save+0x34/0x480 [ 304.783338][ C1] ? memset_erms+0x9/0x10 [ 304.783366][ C1] ? __kasan_slab_alloc+0xcf/0xf0 [ 304.783382][ C1] dev_queue_xmit+0x17/0x20 [ 304.783397][ C1] br_dev_queue_push_xmit+0x52a/0x6a0 [ 304.783416][ C1] ? __napi_poll+0xbe/0x590 [ 304.783432][ C1] ? net_rx_action+0x371/0x8e0 [ 304.783449][ C1] ? handle_softirqs+0x250/0x560 [ 304.783466][ C1] ? __irq_exit_rcu+0x52/0xf0 [ 304.783482][ C1] ? irq_exit_rcu+0x9/0x10 [ 304.783498][ C1] ? sysvec_apic_timer_interrupt+0xa9/0xc0 [ 304.783517][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 304.783534][ C1] ? preempt_schedule_irq+0x96/0x110 [ 304.783553][ C1] ? nla_nest_cancel+0x90/0x90 [ 304.783570][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 304.783587][ C1] ? __stack_depot_save+0x17e/0x480 [ 304.783604][ C1] ? stack_depot_save+0xe/0x10 [ 304.783619][ C1] ? save_stack+0x101/0x1e0 [ 304.783634][ C1] ? __reset_page_owner+0x35/0x190 [ 304.783648][ C1] ? free_unref_page+0xa2/0x550 [ 304.783665][ C1] ? __free_pages+0x6c/0x100 [ 304.783679][ C1] ? __free_slab+0xe8/0x1e0 [ 304.783696][ C1] ? __unfreeze_partials+0x160/0x190 [ 304.783714][ C1] br_forward_finish+0xcc/0x210 [ 304.783731][ C1] ? slab_post_alloc_hook+0x4f/0x2b0 [ 304.783748][ C1] ? kmem_cache_alloc+0xf7/0x260 [ 304.783764][ C1] ? inet_netconf_notify_devconf+0x169/0x220 [ 304.783783][ C1] ? br_dev_queue_push_xmit+0x6a0/0x6a0 [ 304.783801][ C1] ? ip_tunnel_delete_nets+0x343/0x390 [ 304.783816][ C1] ? ipgre_tap_exit_batch_net+0x22/0x30 [ 304.783834][ C1] ? setup_net+0x731/0xa90 [ 304.783849][ C1] ? copy_net_ns+0x355/0x5c0 [ 304.783863][ C1] ? create_new_namespaces+0x3a2/0x660 [ 304.783879][ C1] ? copy_namespaces+0x1d1/0x220 [ 304.783894][ C1] ? copy_process+0x118d/0x3210 [ 304.783911][ C1] ? kernel_clone+0x23f/0x940 [ 304.783927][ C1] ? __x64_sys_clone+0x176/0x1d0 [ 304.783945][ C1] ? x64_sys_call+0x41f/0x9a0 [ 304.783961][ C1] ? do_syscall_64+0x4c/0xa0 [ 304.783976][ C1] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 304.783995][ C1] ? memcpy+0x56/0x70 [ 304.784011][ C1] __br_forward+0x3cd/0x4f0 [ 304.784029][ C1] ? br_forward+0x300/0x300 [ 304.784046][ C1] ? __skb_clone+0x47a/0x790 [ 304.784064][ C1] ? skb_clone+0x202/0x360 [ 304.784082][ C1] br_flood+0x3cf/0x420 [ 304.784101][ C1] br_handle_frame_finish+0xdae/0x1200 [ 304.784122][ C1] ? brport_get_ownership+0x80/0x80 [ 304.784142][ C1] ? kfree_skbmem+0x10c/0x180 [ 304.784159][ C1] ? bpf_trace_run3+0xd1/0x1e0 [ 304.784177][ C1] br_handle_frame+0x8fc/0xf50 [ 304.784197][ C1] ? br_get_rx_handler+0x20/0x20 [ 304.784215][ C1] ? kmem_cache_free+0x2f8/0x320 [ 304.784232][ C1] ? skb_release_data+0x1c6/0xa10 [ 304.784250][ C1] ? br_get_rx_handler+0x20/0x20 [ 304.784267][ C1] __netif_receive_skb_core+0xe49/0x2f10 [ 304.784286][ C1] ? ip6_mc_input+0x235/0x2a0 [ 304.784305][ C1] ? set_rps_cpu+0x5d0/0x5d0 [ 304.784320][ C1] ? ipv6_rcv+0xe9/0x210 [ 304.784337][ C1] ? ip6_rcv_finish+0x360/0x360 [ 304.784354][ C1] ? __irq_exit_rcu+0x5e/0xf0 [ 304.784380][ C1] ? refcount_add+0x80/0x80 [ 304.784396][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 304.784415][ C1] ? __kasan_check_write+0x14/0x20 [ 304.784431][ C1] ? _raw_spin_lock+0x8e/0xe0 [ 304.784448][ C1] __netif_receive_skb+0x72/0x280 [ 304.784467][ C1] process_backlog+0x368/0x600 [ 304.784488][ C1] __napi_poll+0xbe/0x590 [ 304.784506][ C1] net_rx_action+0x371/0x8e0 [ 304.784524][ C1] ? net_tx_action+0x520/0x520 [ 304.784543][ C1] ? irqtime_account_irq+0x76/0x390 [ 304.784560][ C1] handle_softirqs+0x250/0x560 [ 304.784581][ C1] __irq_exit_rcu+0x52/0xf0 [ 304.784597][ C1] irq_exit_rcu+0x9/0x10 [ 304.784612][ C1] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 304.784631][ C1] [ 304.784635][ C1] [ 304.784641][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 304.784659][ C1] RIP: 0010:preempt_schedule_irq+0x96/0x110 [ 304.784679][ C1] Code: 00 00 00 9c 8f 44 24 20 f6 44 24 21 02 74 0b 0f 0b 48 f7 03 08 00 00 00 74 4d bf 01 00 00 00 e8 b0 d1 9f fc fb bf 01 00 00 00 b5 e4 ff ff fa bf 01 00 00 00 e8 4a d3 9f fc 65 48 8b 1d 82 36 [ 304.784693][ C1] RSP: 0018:ffffc90000bf6aa0 EFLAGS: 00000246 [ 304.784707][ C1] RAX: 1ffff1102248fb36 RBX: ffff88811247cf00 RCX: ffffffff870c5f00 [ 304.784720][ C1] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000001 [ 304.784730][ C1] RBP: ffffc90000bf6b28 R08: dffffc0000000000 R09: ffffed102248f9e1 [ 304.784741][ C1] R10: ffffed102248f9e1 R11: 1ffff1102248f9e0 R12: 0000000000000000 [ 304.784751][ C1] R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff9200017ed54 [ 304.784764][ C1] ? __cond_resched+0xb0/0xb0 [ 304.784780][ C1] ? unwind_next_frame+0x3d5/0x700 [ 304.784797][ C1] irqentry_exit_cond_resched+0x29/0x30 [ 304.784811][ C1] irqentry_exit+0x37/0x40 [ 304.784825][ C1] sysvec_apic_timer_interrupt+0x64/0xc0 [ 304.784841][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 304.784856][ C1] RIP: 0010:__stack_depot_save+0x17e/0x480 [ 304.784872][ C1] Code: a9 04 45 89 e9 41 81 e1 ff 0f 00 00 4e 8b 24 cf 4d 85 e4 74 5c 44 89 f1 eb 09 4d 8b 24 24 4d 85 e4 74 4e 45 39 6c 24 08 75 f0 <45> 39 74 24 0c 75 e9 31 d2 48 8b 34 d3 49 3b 74 d4 18 75 dc 48 ff [ 304.784883][ C1] RSP: 0018:ffffc90000bf6c28 EFLAGS: 00000246 [ 304.784894][ C1] RAX: 0000000000000000 RBX: ffffc90000bf6ce0 RCX: 0000000000000010 [ 304.784904][ C1] RDX: 00000000e0ee5b57 RSI: 0000000073b10190 RDI: ffff88823fec0000 [ 304.784914][ C1] RBP: ffffc90000bf6c80 R08: 0000000000000001 R09: 0000000000000c0d [ 304.784924][ C1] R10: 000000002ce51edb R11: 1ffff9200017ed6d R12: ffff88812a33e690 [ 304.784934][ C1] R13: 000000004e435c0d R14: 0000000000000010 R15: 0000000000002800 [ 304.784947][ C1] ? __stack_depot_save+0x34/0x480 [ 304.784962][ C1] ? finish_task_switch+0x209/0x780 [ 304.784979][ C1] stack_depot_save+0xe/0x10 [ 304.784993][ C1] save_stack+0x101/0x1e0 [ 304.785006][ C1] ? __reset_page_owner+0x190/0x190 [ 304.785019][ C1] ? free_unref_page_prepare+0x542/0x550 [ 304.785033][ C1] ? free_unref_page+0xa2/0x550 [ 304.785046][ C1] ? __free_pages+0x6c/0x100 [ 304.785059][ C1] ? __free_slab+0xe8/0x1e0 [ 304.785073][ C1] ? __unfreeze_partials+0x160/0x190 [ 304.785087][ C1] ? put_cpu_partial+0xc6/0x120 [ 304.785101][ C1] ? __slab_free+0x1d4/0x290 [ 304.785115][ C1] ? ___cache_free+0x104/0x120 [ 304.785129][ C1] ? qlink_free+0x4d/0x90 [ 304.785142][ C1] ? qlist_free_all+0x5f/0xb0 [ 304.785155][ C1] ? kasan_quarantine_reduce+0x14a/0x170 [ 304.785169][ C1] ? __kasan_slab_alloc+0x2f/0xf0 [ 304.785182][ C1] ? slab_post_alloc_hook+0x4f/0x2b0 [ 304.785196][ C1] ? kmem_cache_alloc+0xf7/0x260 [ 304.785210][ C1] ? __alloc_skb+0xe0/0x740 [ 304.785223][ C1] ? inet_netconf_notify_devconf+0x169/0x220 [ 304.785238][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 304.785252][ C1] ? sched_clock+0x9/0x10 [ 304.785266][ C1] ? preempt_schedule_common+0xbe/0xf0 [ 304.785282][ C1] __reset_page_owner+0x35/0x190 [ 304.785296][ C1] free_unref_page_prepare+0x542/0x550 [ 304.785311][ C1] free_unref_page+0xa2/0x550 [ 304.785325][ C1] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 304.785341][ C1] ? mark_free_pages+0x660/0x660 [ 304.785364][ C1] __free_pages+0x6c/0x100 [ 304.785377][ C1] __free_slab+0xe8/0x1e0 [ 304.785392][ C1] __unfreeze_partials+0x160/0x190 [ 304.785409][ C1] put_cpu_partial+0xc6/0x120 [ 304.785423][ C1] __slab_free+0x1d4/0x290 [ 304.785439][ C1] ? qlink_free+0x3b/0x90 [ 304.785452][ C1] ___cache_free+0x104/0x120 [ 304.785467][ C1] qlink_free+0x4d/0x90 [ 304.785480][ C1] qlist_free_all+0x5f/0xb0 [ 304.785495][ C1] kasan_quarantine_reduce+0x14a/0x170 [ 304.785510][ C1] __kasan_slab_alloc+0x2f/0xf0 [ 304.785523][ C1] ? kasan_set_track+0x5b/0x70 [ 304.785535][ C1] ? kasan_set_track+0x4a/0x70 [ 304.785547][ C1] ? kasan_set_free_info+0x23/0x40 [ 304.785560][ C1] ? ____kasan_slab_free+0x125/0x160 [ 304.785574][ C1] ? __kasan_slab_free+0x11/0x20 [ 304.785586][ C1] ? slab_free_freelist_hook+0xc2/0x190 [ 304.785601][ C1] ? kfree+0xc4/0x270 [ 304.785614][ C1] ? inetdev_event+0x7a5/0x10a0 [ 304.785627][ C1] ? raw_notifier_call_chain+0x90/0x100 [ 304.785640][ C1] ? unregister_netdevice_many+0xfb8/0x1990 [ 304.785655][ C1] ? ip_tunnel_delete_nets+0x343/0x390 [ 304.785669][ C1] ? ipgre_tap_exit_batch_net+0x22/0x30 [ 304.785683][ C1] ? setup_net+0x731/0xa90 [ 304.785696][ C1] ? copy_net_ns+0x355/0x5c0 [ 304.785708][ C1] ? create_new_namespaces+0x3a2/0x660 [ 304.785722][ C1] ? copy_namespaces+0x1d1/0x220 [ 304.785735][ C1] ? copy_process+0x118d/0x3210 [ 304.785749][ C1] ? kernel_clone+0x23f/0x940 [ 304.785764][ C1] ? __x64_sys_clone+0x176/0x1d0 [ 304.785778][ C1] ? x64_sys_call+0x41f/0x9a0 [ 304.785791][ C1] ? do_syscall_64+0x4c/0xa0 [ 304.785805][ C1] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 304.785826][ C1] slab_post_alloc_hook+0x4f/0x2b0 [ 304.785841][ C1] ? should_failslab+0x9/0x20 [ 304.785855][ C1] ? __alloc_skb+0xe0/0x740 [ 304.785868][ C1] kmem_cache_alloc+0xf7/0x260 [ 304.785883][ C1] __alloc_skb+0xe0/0x740 [ 304.785898][ C1] inet_netconf_notify_devconf+0x169/0x220 [ 304.785915][ C1] inetdev_event+0x7c6/0x10a0 [ 304.785928][ C1] ? devinet_exit_net+0x220/0x220 [ 304.785941][ C1] ? cfg802154_netdev_notifier_call+0x53/0x640 [ 304.785958][ C1] raw_notifier_call_chain+0x90/0x100 [ 304.785973][ C1] unregister_netdevice_many+0xfb8/0x1990 [ 304.785990][ C1] ? alloc_netdev_mqs+0xc90/0xc90 [ 304.786004][ C1] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 304.786020][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 304.786038][ C1] ip_tunnel_delete_nets+0x343/0x390 [ 304.786054][ C1] ? ip_tunnel_bind_dev+0x700/0x700 [ 304.786068][ C1] ? xfrmi6_err+0x640/0x640 [ 304.786084][ C1] ? setup_net+0x703/0xa90 [ 304.786098][ C1] ipgre_tap_exit_batch_net+0x22/0x30 [ 304.786112][ C1] ? ipgre_tap_init_net+0x30/0x30 [ 304.786126][ C1] setup_net+0x731/0xa90 [ 304.786140][ C1] ? copy_net_ns+0x5c0/0x5c0 [ 304.786155][ C1] copy_net_ns+0x355/0x5c0 [ 304.786170][ C1] create_new_namespaces+0x3a2/0x660 [ 304.786185][ C1] copy_namespaces+0x1d1/0x220 [ 304.786198][ C1] ? copy_signal+0x4cb/0x600 [ 304.786211][ C1] copy_process+0x118d/0x3210 [ 304.786229][ C1] ? irqentry_exit+0x37/0x40 [ 304.786245][ C1] ? __pidfd_prepare+0x150/0x150 [ 304.786260][ C1] ? kernel_clone+0xa2/0x940 [ 304.786276][ C1] kernel_clone+0x23f/0x940 [ 304.786292][ C1] ? create_io_thread+0x130/0x130 [ 304.786310][ C1] __x64_sys_clone+0x176/0x1d0 [ 304.786325][ C1] ? __ia32_sys_vfork+0xf0/0xf0 [ 304.786343][ C1] ? debug_smp_processor_id+0x17/0x20 [ 304.786365][ C1] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 304.786382][ C1] x64_sys_call+0x41f/0x9a0 [ 304.786395][ C1] do_syscall_64+0x4c/0xa0 [ 304.786409][ C1] ? clear_bhb_loop+0x50/0xa0 [ 304.786423][ C1] ? clear_bhb_loop+0x50/0xa0 [ 304.786438][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 304.786453][ C1] RIP: 0033:0x7ffb9322ebe9 [ 304.786466][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.786477][ C1] RSP: 002b:00007ffb91c96fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 304.786492][ C1] RAX: ffffffffffffffda RBX: 00007ffb93465fa0 RCX: 00007ffb9322ebe9 [ 304.786502][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c0000000 [ 304.786511][ C1] RBP: 00007ffb932b1e19 R08: 0000000000000000 R09: 0000000000000000 [ 304.786521][ C1] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 304.786530][ C1] R13: 00007ffb93466038 R14: 00007ffb93465fa0 R15: 00007ffcf760be78 [ 304.786544][ C1] [ 304.788375][ C0] net_ratelimit: 71395 callbacks suppressed [ 304.788390][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.798011][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 304.802629][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.802712][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.802793][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.802875][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.802955][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.803036][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.803134][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.803215][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.793120][ C0] net_ratelimit: 75273 callbacks suppressed [ 309.793140][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.793498][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 309.799230][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.812148][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 309.821725][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.821815][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.821894][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.821991][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.822068][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.822143][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.803115][ C0] net_ratelimit: 51785 callbacks suppressed [ 314.803135][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.815901][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 314.820622][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.820713][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.820793][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.820871][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.820949][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.821033][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.821111][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.821190][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.813169][ C1] net_ratelimit: 47428 callbacks suppressed [ 319.813191][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 319.813781][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.819285][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 319.819606][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 319.820096][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 319.820215][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 319.820300][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 319.820698][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 319.820774][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 319.821092][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 324.823118][ C0] net_ratelimit: 33117 callbacks suppressed [ 324.823137][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.825116][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 324.829141][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.829229][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.829307][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.829390][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.829468][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.829545][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.829623][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.829705][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.833137][ C0] net_ratelimit: 75792 callbacks suppressed [ 329.833157][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.834465][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 329.839437][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.839516][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.839594][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.839675][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.839757][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.839835][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.839913][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.839992][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.843107][ C0] net_ratelimit: 75008 callbacks suppressed [ 334.843128][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.843393][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 334.849149][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.849226][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.849300][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.849382][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.849464][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.849538][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.849613][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.849688][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.853086][ C0] net_ratelimit: 78169 callbacks suppressed [ 339.853107][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.863559][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 339.870504][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.870582][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.870657][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.870733][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.870815][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.870890][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.870965][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.871039][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.863112][ C0] net_ratelimit: 78234 callbacks suppressed [ 344.863133][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.869649][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 344.880262][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.880356][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.880432][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.880507][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.880581][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.880662][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.880744][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.880818][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.873086][ C0] net_ratelimit: 78560 callbacks suppressed [ 349.873108][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.885476][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 349.890291][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.890372][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.890449][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.890552][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.890634][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.890709][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.890786][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.890866][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.883111][ C0] net_ratelimit: 68130 callbacks suppressed [ 354.883131][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.883566][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 354.889234][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.889311][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.889386][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.889461][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.889551][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.889627][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.889701][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.889776][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.893162][ C0] net_ratelimit: 79217 callbacks suppressed [ 359.893184][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.896383][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 359.899197][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.899275][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.899351][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.899426][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.899507][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.899582][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.899657][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.899731][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.903114][ C0] net_ratelimit: 78789 callbacks suppressed [ 364.903134][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.913931][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 364.920534][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.920626][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.920705][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.920795][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.920871][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.920947][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.921022][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.921116][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.913112][ C0] net_ratelimit: 74633 callbacks suppressed [ 369.913140][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.921059][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 369.930267][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.930344][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.930428][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.930502][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.930576][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.930652][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.930732][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.933099][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.923099][ C0] net_ratelimit: 76849 callbacks suppressed [ 374.923120][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.932286][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 374.940268][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.940344][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.940430][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.940506][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.940578][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.940652][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.940732][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.940806][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.933105][ C0] net_ratelimit: 78503 callbacks suppressed [ 379.933127][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.940225][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 379.950248][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.950324][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.950398][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.950473][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.953126][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.977484][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 379.984209][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.984297][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.943176][ C0] net_ratelimit: 71195 callbacks suppressed [ 384.943193][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.943299][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 384.952707][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.960584][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 384.960686][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 384.961127][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 384.961206][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 384.961547][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 384.962066][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 384.962146][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 389.953490][ C1] net_ratelimit: 56366 callbacks suppressed [ 389.953511][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 389.954588][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.959597][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 389.959674][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 389.960078][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 389.960153][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 389.960464][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 389.960968][ C1] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0) [ 389.961045][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 389.961125][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 394.963128][ C0] net_ratelimit: 74894 callbacks suppressed [ 394.963150][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.963704][ C1] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0) [ 394.969148][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.969241][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.969316][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.969389][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.969469][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.969544][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.969618][ C0] bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.969699][ C0] bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)