last executing test programs: 30.943781143s ago: executing program 0 (id=1094): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x3, 0x14, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003010000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="b9ff03076003008cfaffffff88a8", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x2a, &(0x7f0000000100)=r5, 0x4) (async) sendmsg$unix(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="17fb9550430f", 0x6}], 0x1, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18, 0x20048884}, 0x40000) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x9, 0x6, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@exit, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000000280)='syzkaller\x00', 0x7fff, 0x1000, &(0x7f00000006c0)=""/4096, 0x40f00, 0x20, '\x00', r1, @cgroup_sock=0x22, 0xffffffffffffffff, 0x8, &(0x7f00000016c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001700)={0x5, 0x2, 0x9, 0x77a8}, 0x10, r2, 0xffffffffffffffff, 0x3, &(0x7f0000001740)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001780)=[{0x3, 0x1, 0x6, 0x2}, {0x0, 0x1, 0xf, 0x8}, {0x1, 0x5, 0xe, 0x6}], 0x10, 0x64d2}, 0x94) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000001880)=r6) 30.467387838s ago: executing program 0 (id=1100): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x28, 0xe80, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffd) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x143842, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000980)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x06\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x06\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2a482, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) openat$tun(0xffffffffffffff9c, 0x0, 0x4ca80, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x123c02, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x40047438, 0x110c230041) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000001f40)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1C\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x6, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd3}, [@exit, @ldst={0x0, 0x0, 0x2, 0x8, 0x3, 0xffffffffffffffc0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r4, &(0x7f0000000780)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 27.54342279s ago: executing program 0 (id=1112): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x20, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8a08, 0x0, 0x0, 0x0, 0x659}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x7, 0x0, 0x8, 0x2, 0x1, 0x1, 0x4}, @jmp={0x5, 0x0, 0x1d, 0x6, 0x8, 0x10, 0xfffffffffffffff0}, @map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfa7}, @map_val={0x18, 0xa, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000780)='GPL\x00', 0x1, 0x8c, &(0x7f00000007c0)=""/140, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000008c0)={0x4, 0x0, 0x5, 0xed}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x5, 0x1, 0x4, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x3, 0x3, 0x9, 0x6}, {0x4, 0x4, 0xa, 0x3}, {0x1ff, 0x5, 0x10, 0x3}], 0x10, 0x5}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0xd54c, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0x43, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@fallback=r4, 0x15, 0x1, 0x2, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r5, r7, 0x2c, 0x2000, 0x0, @value=r5, @void, @void, @void, r8}, 0x20) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x14, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='GPL\x00', 0xf, 0x4c, &(0x7f0000000b80)=""/76, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x1, 0x4, 0x5, 0x8}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000c80)=[r2, r2, r2], &(0x7f0000000cc0)=[{0x3, 0x4, 0x0, 0xb}, {0x2, 0x5, 0x10, 0x6}, {0x2, 0x2, 0x4, 0x4}, {0x0, 0x5, 0x6, 0x4}, {0x5, 0x3, 0xc, 0xc}, {0x1, 0x5, 0x4, 0xb}, {0x2, 0x1, 0x0, 0xa}], 0x10, 0x8}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000a40)={@fallback=r1, r3, 0x27, 0x4, 0x0, @void, @value=r9, @void, @void, r8}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r10) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r12) 27.427244462s ago: executing program 3 (id=1113): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000008b0000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x88) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r0}, 0x38) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x12, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000340)=')\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) close(r7) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r9, 0x0, 0x36, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_devices(r3, &(0x7f00000005c0)=ANY=[], 0xfffffeff) 26.74807913s ago: executing program 1 (id=1117): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 26.69944119s ago: executing program 1 (id=1118): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000e2ff00"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7f9ffffffffffff7a8af8ff00000000bca200000000000007020000f8ffff81000300f207000000b70400000000000085000000160000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="060000007f00000040200000056d0dde94fd1d773884a9a542e1399e9d082ace4f42a181fc2595470f8010e58701463aa00a1a703507102514cfb1d59151bfd90a74fb93850d83996c978e15ae2632ec3e9826d61228b28d4f9157a892c671ccb11a4b5e318dfafb89bb515aa6be643f2c4cf822aade620af64a75", @ANYRES16=0x0, @ANYRESHEX, @ANYRES64=r0, @ANYRESDEC=0x0], 0x48) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x1000}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x1, 0x9}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r4, r5}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r4, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) (async) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x101d81, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x200, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0xd120, 0x10000000000, 0xfffffffd, 0x1, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x12, 0xffffffffffffffff, 0x0) (async, rerun: 64) close(0x4) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000002c0)}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r7, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x103, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) (async, rerun: 64) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (rerun: 64) write$cgroup_subtree(r9, &(0x7f00000004c0)=ANY=[], 0xfdef) (async) ioctl$TUNSETOFFLOAD(r6, 0x4004743d, 0x110c230000) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x4, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000050002000000000085000000cc00000085000000000000000500feff000000009500000000000000"], &(0x7f00000003c0)='GPL\x00', 0x2, 0xff9, &(0x7f0000000a80)=""/4089}, 0x21) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x2a}, @printk={@lld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffdf) (async, rerun: 64) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async, rerun: 64) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r11}, 0xc) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r10, &(0x7f0000000380), &(0x7f00000003c0)=""/247}, 0x20) 26.69536953s ago: executing program 0 (id=1120): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4, 0x0, 0x0, 0xe, 0x3}]}}, 0x0, 0x2a}, 0x28) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x13}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x72}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f0000000180)="5fb90c5c4426cc8fa8574be842c1", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNSETDEBUG(r1, 0x400454c9, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 26.368365694s ago: executing program 4 (id=1122): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x2e, 0x2e, 0xe]}}, &(0x7f0000000480)=""/171, 0x1d, 0xab, 0x1}, 0x28) (rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x6}}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10}]}}, 0x0, 0x42}, 0x28) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0xfa, 0x100, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7) (async) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair(0x2, 0x1, 0x9, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000540)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b706000014000000b7030000000000008500000005000000bc0900000000000035090100000000009500000004000000b70200000a0000007b6af8ff00000000b5090200090000007baaf0ff00000000bfa900000000000007080000f8ffffffbf6400000000000007040000f0ffffffb60400000800000018260000", @ANYRES32=0x0, @ANYBLOB="0000000000004000b7050000080000004608f0ff760000fcbeb800080000000056080000000000008500000007000000000000000000000495000000000000005bd0b66fe974e16ffc4f17bb920000de04760c1eab9be2b010b5ed917d3877d3f4f9389bfd5ba6928a2626af787d5bab9a53da93553d88c80d2b1366a118ae92d145085948697093aad263b9e8bde27e1c93404735866a334b7c058a21d636ffa8f6c448716e78463a8f2ed8b7e574110b455200b10cb731295176d71dca6d346ef536cf155dfa09ec2a252b193de144"], &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 26.263816055s ago: executing program 3 (id=1123): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x2a}, @printk={@lld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffdf) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@float={0x5, 0x0, 0x0, 0x10, 0x2}, @decl_tag={0xc, 0x0, 0x0, 0x11, 0x5, 0x6}, @func={0x2, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x2e, 0x2e, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/240, 0x46, 0xf0, 0x0, 0x5, 0x10000}, 0x28) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x6, 0x7, 0xa, 0x10, 0x1}, @ldst={0x1, 0x1, 0x3, 0xb, 0x2, 0x8, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1d}, @initr0={0x18, 0x0, 0x0, 0x0, 0xad, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x60, &(0x7f0000000180)=""/96, 0x40f00, 0x1f, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000780)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0x8, 0xfffff000, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000880)=[r0, r0, r0, r0, r3, r0], &(0x7f00000008c0)=[{0x0, 0x2, 0x9, 0x7}, {0x5, 0x2, 0x10, 0x9}, {0x5, 0x3, 0x1, 0x1}, {0x0, 0x4, 0xa, 0xc}, {0x3, 0x2, 0xf, 0xf}], 0x10, 0x6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3}}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @var={0x1, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0x2e]}}, &(0x7f00000004c0)=""/204, 0x4f, 0xcc, 0x1}, 0x28) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0xe, 0x24400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x200000000000, r5, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 26.205103405s ago: executing program 1 (id=1124): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xffffffff}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3}, 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="b907ef19edfff007049e0ff0888e", 0x0, 0x102a, 0x18000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 26.120410717s ago: executing program 2 (id=1125): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000001500)={&(0x7f0000000040)=@file={0x3, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="ee1493e272070c8305ae058e53985d7dfb95508366cc3e23f516394dbe092d6f0688d3d871f0e102c56d1be9c6876f9da18f304821827a1283ef5c2a13564543ad9900ffeb29c43cb85cd9ed8dc8f3cf6a0ca7cf19e0bacf430d92c549438b7e6a16673efe", 0x65}, {&(0x7f0000000200)="247a75d02b98483e10ca1922f278c32366f325ef9821d68319ecb2a1cabac4e2dad7935c9f7ebdaab891bfb58a4e4b7780108abb4aef4ac31302481403388ec461dd0d9ae01d6d273a3aca6a03629c16d2b7868144e35bb973bfb6c08d6d304d02f9282196f5c9a015b15e", 0x6b}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="6a649af8ab2e941119ce48a9519a99e38f76293a9c95960a7dda445f4f3ade21d560c6849d31b5b74fac9938d68256c1361c737ec2bf6e5adc9879605ae62d276acc210d791d9551897578fe343ff68b08e73f31a0c578ee2a573857a29d276f36ed30cb96f3396c98c73716af0838abbe9e7fd034c08a05e9315312a209c4bb29f983b189b550e7c8aa4fbba6286bf723960c39390cf6366a1be71381202ecba00d689bef0e4ff0cf2d9d3ed565d2daf2631b0cc4617841ed8d2abdf12ae0b93ea00f2ae893a0d6cd", 0xc9}, {&(0x7f0000001380)="f26624e59c221946e526c77ade30faaab688d989dabf7ea9656a323b5ef89d37f5a2f535972d1f26b448cdd2631e5c447b1ee1e338bb802717b72a5cf1ab77ba3923718f8173fa8abd89276fa4ec9cf411d01ffd12c68ed0ad925c8c4430d65a1c7ecff96b28525b75de42657d40283a045fd06e34cec5681a4889b4eb2bd4e5e8fda5334fabf011b637b5e61c5e8f1683ecbf50c961a8c2e909eebaea5e", 0x9e}], 0x5, &(0x7f00000014c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x20, 0x20000090}, 0x4880) 26.118881426s ago: executing program 1 (id=1126): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b28, &(0x7f0000000000)={'wlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x8000, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, 0x0) write$cgroup_devices(r3, &(0x7f00000005c0)=ANY=[], 0xfffffeff) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x3, 0x0, 0x0, 0xfc, 0x0, 0x5d31, 0x183b, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x12000000, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x32}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xa, r2, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000300)=0x6, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000b106", @ANYRES64], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) 26.096837917s ago: executing program 4 (id=1127): perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x10, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x4, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffff858500000073000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x8, 0x8, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdbada2a81f159d3f}, 0x50) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce81020333eabc08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 25.975013418s ago: executing program 2 (id=1128): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0x13, &(0x7f00000007c0)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc, 0x0, 0x0, 0x0, 0x779911f4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000300)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x59, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x1a, 0xb, 0x5, 0x4, 0x20c1}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)='%ps \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x37}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7d}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8927, &(0x7f0000000280)={'wg2\x00'}) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) 25.724389341s ago: executing program 4 (id=1129): socketpair(0x2, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000300000000000000000000001801000020a0702500000000008000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000000400000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0xf, 0x3, 0x8, &(0x7f0000000500)) (async) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) (async) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x3, 0x0, 0x8, 0xff, 0x0, 0x6, 0x804, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0xf63ce95deb1436a0, 0xb29, 0x0, 0x7, 0x0, 0x40000002, 0x1, 0x0, 0x1ff, 0x0, 0xfffffffffffffffa}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x9) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'rose0\x00', 0x200}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x0, 0x5cbb, &(0x7f0000000240)) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="7a0500070100000071106a00000000000000000000e4"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) r6 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r6, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280), 0x0, 0x97, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000004c0), &(0x7f0000000400), 0x8, 0x71, 0x8, 0x0, 0x0}}, 0x10) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) (async) r9 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, r9, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x23, 0x3, 0x8, &(0x7f0000000040)) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffffe, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x20000040}, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) (async, rerun: 32) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 25.604931663s ago: executing program 0 (id=1130): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20061, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0}, 0x8001, 0x100, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0800000004000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200000000000000000000000000000000009f6000000000"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000000000008500000005"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x19, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0) openat$cgroup_subtree(r3, 0x0, 0x2, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 25.604096823s ago: executing program 2 (id=1131): perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0), 0x2}, 0x4, 0x7fff, 0x0, 0x0, 0x0, 0xc7df}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x7eed00, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000300)={&(0x7f00000000c0)="ca3ec46bb94979110f9cddecf96b495ab85b763022ad94a0c5a48997d1e70e79027a3bc47e3ddfbc952d035c40dba102f22102c672855049", &(0x7f0000000140)=""/59, &(0x7f0000000180)="e2f409c72e8d7f2165416adbce13d36c39879f", &(0x7f00000001c0)="699f2b8db096d6ea5e4513c26b6d8b28511cb696fdab2cc8d4a7f3a71dc2112813a7c5322166df00d42f7e802fa623507eceb93378377628764ae8def729570fd97eb8e800859452dc8cbc121613e17049153446053bf6d646a27b7dd28dc545458e8e63416b618e497694ebcca0ddf61bd63f2db64b091c0674599f1a33bcbaadb918", 0x8, r1, 0x4}, 0x38) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/165}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0xbc, 0x4d91, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}, 0x40) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x30, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x6, 0x3, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r5, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) 25.579840103s ago: executing program 4 (id=1132): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000a40)="a8", 0x0}, 0x20) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) close(r1) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x121881, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="05000000000000004e8f5c3029ddb71d3b45cfcfa0fff92f6b115f0000000000851000000200000085000000050000009500330000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x5, &(0x7f0000000000)=@raw=[@func, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}], 0x0, 0x2}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f3, &(0x7f0000000080)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={r8, 0xffffffffffffffff}, 0x4) r10 = perf_event_open$cgroup(&(0x7f0000000240)={0x4, 0x80, 0x2, 0x6, 0x7c, 0x7, 0x0, 0x6, 0x20000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x17}, 0x20002c, 0xfffffffffffffffc, 0x1ff, 0x5, 0x71a0, 0x80000000, 0x5, 0x0, 0x61e9, 0x0, 0x10}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r4) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="b3", @ANYBLOB="0a00000084000000000100000100000000000000", @ANYRES8=r6, @ANYRES16=r5], 0x50) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x4f, r9, 0x4}, 0x38) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff0000, 0x9, 0x0, 0xffffffff, 0x0, 0x9ba5}, 0x0, 0x20000000000, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRESOCT=r8, @ANYRES32, @ANYBLOB="00451a00000000000000090000002f3300000000", @ANYRES8=0x0, @ANYRES32, @ANYBLOB="000000001000000000000000000000000000002dc174d1d1f56d5c00fdff000000000000"], 0x50) 25.500293234s ago: executing program 3 (id=1133): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x100820, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff0000000000000000851000000200000085000000070000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f0000000400)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r3, &(0x7f0000000780)="a40d193612410d853f0bf59712ab5e4b5bfb51a118e5ea92fdb218908eca30133ff13f88650d2083d3d668f0e14e4804ee1e21f39a8437c55cccb37d06534ad99c36222c6c5ed3e8a74f99e7ebd9f77edd784d2bc5d2286186956b63aa51d7df316f4e63e61e53a978f00a750234273929f04dd1c7204a1d451232e4045a744f0339704f00de8633d7b4169640cfe95b1cd94accfa64ffc36f37ee43ae1f2a6bece8650e54f0155a2efa", &(0x7f0000000840)=""/176}, 0x20) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') (async) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r4}, 0x8) close(r5) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYRES16=r0], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811000032cdedaba114caed03e4638b8bcab574775e54c7a814486dbf9250ff41c27854a0d5b205e2106b012df278a541bbed0c6ed4cfc56d3961a4600e13607b9e6e5dbe59ede3e9f660399abd8f24fc43b417bb7c2a85e7cc0ec45f6fac08bb81e52bfa2d49f93aeb0ac5b34dce7e5d29509e9871ce86ced4cdc4256176a3d7f5117829a1bfcaa748aaf6a4", @ANYRES32=r7, @ANYRES64=r5], &(0x7f0000000040)='syzkaller\x00', 0x7c, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000001c0)={r8, 0xffffffffffffffff, 0x60000000}, 0xc) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@o_path={&(0x7f0000000040)='./file0\x00', r8, 0x4000, r0}, 0x18) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0}, 0x90) socketpair(0x2, 0x1, 0x3, &(0x7f0000000340)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r9, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x1c, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000218110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000000000700850000001700000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000040000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r11, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 25.400357394s ago: executing program 3 (id=1134): bpf$TOKEN_CREATE(0x24, &(0x7f0000000180), 0x8) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb5, &(0x7f0000000380)=[{}, {}], 0x10, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xb7, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=0xffffffffffffffff, 0x4) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000600)=@bloom_filter={0x1e, 0x7f, 0x2, 0x1, 0x5010, r0, 0x2, '\x00', r1, r2, 0x5, 0x5, 0x4, 0x6}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYRES16=r3], &(0x7f0000000200)='syzkaller\x00', 0x2, 0x100b, &(0x7f0000001e40)=""/4107}, 0x94) 25.250684706s ago: executing program 1 (id=1135): r0 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x2, 0x80000002, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) (async) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000100)={'erspan0\x00', @link_local}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085100000030000001800000000000000000000000000000095000000000000009500000000000000d5b2307878b6a5229917ebb4029a0bea3522c1f874a88524b8256e9616dc84ef9f539900f13815da3cbc479df45e1acd7454a155dd43645345f9a4cddab3d6d9d40e13de56bf656d77b7451f09e02bcb6cf96a4c0fce8ff74fe80460b51e50b4d8105ae605917a45734dbd377e5f99ad246b74853c2ec4862629a63ca0445673c32ad594e33b56f0d0fc6e3a6c84dcd0b6a6746ccfe43cab05ecc5c02583d24d43d968d74062c0f54d148107a22b928921fd"], &(0x7f0000000000)='GPL\x00'}, 0x1a) (async) r7 = syz_clone(0x200000, &(0x7f0000000a00)="992c2796612d72f6bc754e4bc14a4e20dcec1c3929b1557433dea2e68c8eaada8f58b68a6432aba9f2302da437ae192b062bbdafdf", 0x35, &(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)="2386fbabb92ff76a08f16d92666d44695bc080d02e75e9dd9637c7f9750bddd62c38a8e4aa3915809e00234e9ae6ea53c42d50234114473525926b98564503bc4a7a0de15fe898285faeade46ebbe27f9fe138435f9097e1e3f28138c3f170e3b31ca13a750f9bc3a49a15495c2083f43752aeacbad84d2cc0ef47d57401344508d6e6fea0560dc50095da799d43b9920b3c51a655f12c1a6eab2a2a2b9c36363d64378554ce6e1c6c3c014e51079d4799b10e1762ce5c3ecb7225aa205c87743d70d09d576694177ff125e156") write$cgroup_pid(r5, &(0x7f0000000bc0)=r7, 0x12) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000340)={'vlan1\x00', @random="0100e51b1000"}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r8 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) syz_clone(0x180000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r8) (async) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r8}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc6, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x18, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540)=0xffffffffffffffff, 0x4) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1c, 0x12, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9e}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000006c0)='GPL\x00', 0x100, 0x0, 0x0, 0x41100, 0x4b, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0xb, 0x2, 0x1000}, 0x10, 0x0, r2, 0x9, &(0x7f0000000780)=[0xffffffffffffffff, 0x1, r8, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000007c0)=[{0x2, 0x2, 0x5, 0x3}, {0x0, 0x2, 0x6, 0x4}, {0x0, 0x3, 0xc, 0xc}, {0x5, 0x1, 0xc, 0x6}, {0x5, 0x3, 0xa, 0xc}, {0x4, 0x1, 0x1, 0x5}, {0x4, 0x2, 0xa, 0x8}, {0x2, 0x4, 0x9, 0x1}, {0x2, 0x5, 0xf, 0xa}], 0x10, 0x800000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xd, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffa}, [@func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000000}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x17, &(0x7f0000000200)=""/23, 0x40f00, 0x40, '\x00', r10, @sock_ops=0x3, r11, 0x8, &(0x7f0000000580)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0x5, 0xad, 0x4}, 0x10, 0xffffffffffffffff, r12, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) 25.172453927s ago: executing program 3 (id=1136): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x880, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) ioctl$TUNSETLINK(r0, 0x400454cd, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) 24.95217743s ago: executing program 1 (id=1137): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="07000000040000000800000042a0000000000003", @ANYRES32, @ANYBLOB="fbffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x7f, 0x7fff}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000540)="78c398fc0afe291364fe8bb7f5baa5fd38e8b469c0c3148a2bf0ef19f62b4a6ebf5e862a1eb2ad7a428bf5bc24e99ac621cc7d8f2b6040baab9b53a90e0f83a4508be66406edd2466f343d9cd256560c491b90b321537cfa23668e778d9e57242cfc448dea374824bbd7b17f8bd9ffa057187c3c3e1b4bfe8e22", 0x0, 0x1, 0xffffffffffffffff, 0x4}, 0x38) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8100072b00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea0311"], 0xfdef) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[], 0xffbf) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r2) r5 = gettid() perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x311) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000180)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xb, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000100000000000000f30e000018010000756c6c25"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8923, &(0x7f0000000140)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x25, 0x64, 0x2}}) 24.831256751s ago: executing program 2 (id=1138): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0xfffffffa, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0x12, 0xc, 0x8, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002400)={r4, &(0x7f00000013c0), 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x2, 0x66, 0x0, 0x2, r5, 0x2, '\x00', r6, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0x26, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ldst={0x0, 0x2, 0x3, 0x1, 0x7, 0x0, 0xfffffffffffffffc}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x0, 0x0, 0x9, 0x1, 0xfffffffffffffffe, 0xffffffffffffffff}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10400000}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000380)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x41, '\x00', r6, @fallback=0x1f, r0, 0x8, &(0x7f0000000400)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x2, 0x2, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000480)=[{0x3, 0x3, 0x1, 0x7}, {0x4, 0x1, 0x9, 0xa}], 0x10, 0x5}, 0x94) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000300)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, r0, 0x0, 0x4}, 0x50) 24.706885472s ago: executing program 2 (id=1139): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00', 0x0}, 0x30) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000208500000070000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x10, 0x38, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) r4 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x5) openat$cgroup_int(r0, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="a0964adc49"], 0x5) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES32=r6], 0x48) (async) perf_event_open(&(0x7f00000001c0)={0x7, 0x80, 0x1, 0x40, 0x5b, 0x8, 0x0, 0x0, 0x200, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6226}, 0x4008, 0x908c, 0x7fffffff, 0x4, 0xffffffffffffffff, 0x3, 0xffff, 0x0, 0xff, 0x0, 0x70a}, 0x0, 0x10, 0xffffffffffffffff, 0x9) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000500000000000000000000850000002a00000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000057d546c3a62d4fe68f90040000851000001674020000008500000023000000e406aaddf87799095a7dcd7500"/59], 0x0, 0x2, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000180)=r7, 0x4) sendmsg$inet(r9, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) (async) socketpair(0x2, 0x0, 0xfffffffd, &(0x7f0000000340)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0xd, 0x0, 0x8, 0x7, 0x0, 0x10006, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, 0x3, 0x0, 0xffe, 0x0, 0x100000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002}, 0x94) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r10, 0x4008240b, &(0x7f0000000040)={0x1, 0x80, 0x4a, 0x4e, 0x8, 0xff, 0x0, 0x7fffffff, 0x800, 0x11, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x4, 0x0, 0x17e, 0x9, 0xb, 0x8, 0x8, 0x0, 0xb28f0, 0x0, 0x166}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0108180000000000000028000000280000000200000000000000000000da80039e9e042f4dcf108f692a21ca030000000003000000060000000000000003"], 0x0, 0x42}, 0x28) 24.642566933s ago: executing program 4 (id=1140): socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x17, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x7}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8902, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x6, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000900000000000000010000006b011c00000000001800000001000000000000000035000095"], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x8, 0x5aa2, 0x6ad, 0x9, 0x820, r1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000800)=ANY=[@ANYBLOB='1-6:0/', @ANYBLOB="362aa5ffea"], 0x31) write$cgroup_int(r5, &(0x7f0000000000)=0x80, 0x12) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x8, [@int={0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x1c, 0x1}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x55, 0x2}, @restrict={0x10, 0x0, 0x0, 0xb, 0x5}, @struct={0x9, 0x3, 0x0, 0x4, 0x1, 0x7ff, [{0x1, 0x4, 0x7}, {0xd, 0x5, 0x3}, {0xf, 0x0, 0x8}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x2}, @union={0xa, 0x1, 0x0, 0x5, 0x1, 0xb, [{0xe, 0x0, 0x3}]}, @typedef={0x3}]}, {0x0, [0x5f, 0x30, 0x2e, 0x30, 0x30, 0x30]}}, &(0x7f0000000400), 0xac, 0x0, 0x1, 0x5, 0x10000}, 0x28) write$cgroup_int(r5, &(0x7f0000000400), 0x12) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x9, 0x0, r2, 0x401, '\x00', r3, r6, 0x1, 0x3, 0x1}, 0x50) 24.641094143s ago: executing program 3 (id=1141): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4, 0x0, 0x0, 0xe, 0x3}]}}, 0x0, 0x2a}, 0x28) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x13}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x72}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f0000000180)="5fb90c5c4426cc8fa8574be842c1", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNSETDEBUG(r1, 0x400454c9, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 20.651919878s ago: executing program 4 (id=1142): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 18.461755793s ago: executing program 2 (id=1143): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sendmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee00}}}], 0x20, 0x4}, 0x4008040) setsockopt$sock_attach_bpf(r0, 0x1, 0x22, &(0x7f0000000180), 0x4) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000010080)}, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000080)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f00000000c0)='syzkaller\x00', 0x7b, 0xd2, &(0x7f00000001c0)=""/210, 0x41100, 0x19, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x7, 0x9107, 0x52d}, 0x10, 0x284d5, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], 0x0, 0x10, 0x8}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0xd54c, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0x43, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@fallback=r4, 0x15, 0x1, 0x2, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r5, r7, 0x2c, 0x2000, 0x0, @value=r5, @void, @void, @void, r8}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup, r3, 0x5, 0x2000, 0x0, @value, @void, @void, @void, r8}, 0x20) 3.468038651s ago: executing program 32 (id=1130): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20061, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0}, 0x8001, 0x100, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0800000004000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200000000000000000000000000000000009f6000000000"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000000000008500000005"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x19, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0) openat$cgroup_subtree(r3, 0x0, 0x2, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.258767975s ago: executing program 33 (id=1137): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="07000000040000000800000042a0000000000003", @ANYRES32, @ANYBLOB="fbffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x7f, 0x7fff}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000540)="78c398fc0afe291364fe8bb7f5baa5fd38e8b469c0c3148a2bf0ef19f62b4a6ebf5e862a1eb2ad7a428bf5bc24e99ac621cc7d8f2b6040baab9b53a90e0f83a4508be66406edd2466f343d9cd256560c491b90b321537cfa23668e778d9e57242cfc448dea374824bbd7b17f8bd9ffa057187c3c3e1b4bfe8e22", 0x0, 0x1, 0xffffffffffffffff, 0x4}, 0x38) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8100072b00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea0311"], 0xfdef) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[], 0xffbf) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r2) r5 = gettid() perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x311) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000180)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xb, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000100000000000000f30e000018010000756c6c25"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8923, &(0x7f0000000140)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x25, 0x64, 0x2}}) 745.952412ms ago: executing program 34 (id=1141): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4, 0x0, 0x0, 0xe, 0x3}]}}, 0x0, 0x2a}, 0x28) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x13}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x72}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f0000000180)="5fb90c5c4426cc8fa8574be842c1", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNSETDEBUG(r1, 0x400454c9, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 159.897568ms ago: executing program 35 (id=1142): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 0s ago: executing program 36 (id=1143): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sendmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee00}}}], 0x20, 0x4}, 0x4008040) setsockopt$sock_attach_bpf(r0, 0x1, 0x22, &(0x7f0000000180), 0x4) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000010080)}, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000080)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f00000000c0)='syzkaller\x00', 0x7b, 0xd2, &(0x7f00000001c0)=""/210, 0x41100, 0x19, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x7, 0x9107, 0x52d}, 0x10, 0x284d5, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], 0x0, 0x10, 0x8}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0xd54c, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0x43, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@fallback=r4, 0x15, 0x1, 0x2, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r5, r7, 0x2c, 0x2000, 0x0, @value=r5, @void, @void, @void, r8}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup, r3, 0x5, 0x2000, 0x0, @value, @void, @void, @void, r8}, 0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.240' (ED25519) to the list of known hosts. [ 28.499518][ T24] audit: type=1400 audit(1778084853.330:64): avc: denied { mounton } for pid=271 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.503149][ T271] cgroup: Unknown subsys name 'net' [ 28.522474][ T24] audit: type=1400 audit(1778084853.330:65): avc: denied { mount } for pid=271 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.549915][ T24] audit: type=1400 audit(1778084853.360:66): avc: denied { unmount } for pid=271 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.550523][ T271] cgroup: Unknown subsys name 'devices' [ 28.757923][ T271] cgroup: Unknown subsys name 'hugetlb' [ 28.763594][ T271] cgroup: Unknown subsys name 'rlimit' [ 28.905935][ T24] audit: type=1400 audit(1778084853.730:67): avc: denied { setattr } for pid=271 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.929257][ T24] audit: type=1400 audit(1778084853.740:68): avc: denied { mounton } for pid=271 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.954322][ T24] audit: type=1400 audit(1778084853.740:69): avc: denied { mount } for pid=271 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 28.968710][ T273] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 28.986494][ T24] audit: type=1400 audit(1778084853.820:70): avc: denied { relabelto } for pid=273 comm="mkswap" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.012081][ T24] audit: type=1400 audit(1778084853.820:71): avc: denied { write } for pid=273 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.039609][ T24] audit: type=1400 audit(1778084853.870:72): avc: denied { read } for pid=271 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.065215][ T24] audit: type=1400 audit(1778084853.870:73): avc: denied { open } for pid=271 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.091400][ T271] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.754262][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.761695][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.769407][ T280] device bridge_slave_0 entered promiscuous mode [ 29.777590][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.784670][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.792258][ T280] device bridge_slave_1 entered promiscuous mode [ 29.832329][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.839446][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.846874][ T281] device bridge_slave_0 entered promiscuous mode [ 29.862325][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.869476][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.876886][ T281] device bridge_slave_1 entered promiscuous mode [ 29.902023][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.909144][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.916638][ T279] device bridge_slave_0 entered promiscuous mode [ 29.924532][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.931655][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.939217][ T279] device bridge_slave_1 entered promiscuous mode [ 30.032592][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.039727][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.047220][ T282] device bridge_slave_0 entered promiscuous mode [ 30.057135][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.064237][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.071825][ T283] device bridge_slave_0 entered promiscuous mode [ 30.086448][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.093636][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.101095][ T282] device bridge_slave_1 entered promiscuous mode [ 30.107779][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.114814][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.122350][ T283] device bridge_slave_1 entered promiscuous mode [ 30.179769][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.186863][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.194147][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.201217][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.218616][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.225692][ T280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.232989][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.240044][ T280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.288817][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.295974][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.303310][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.310363][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.340394][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.347488][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.354751][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.361831][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.396596][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.404093][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.411595][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.419282][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.427613][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.435846][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.443105][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.450851][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.458404][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.465599][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.473749][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.482168][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.489820][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.498597][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.506800][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.513842][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.538331][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.545911][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.555171][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.562275][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.577253][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.601270][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.609492][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.616574][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.624602][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.633542][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.640658][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.648892][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.656977][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.664911][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.677770][ T281] device veth0_vlan entered promiscuous mode [ 30.690173][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.698398][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.706640][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.714089][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.731317][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.738995][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.747050][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.763044][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.771437][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.779967][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.787054][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.794628][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.803558][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.812054][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.819160][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.826639][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.835080][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.843571][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.858737][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.867286][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.875489][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.882582][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.890650][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.899193][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.907810][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.914940][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.922379][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.930607][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.942138][ T280] device veth0_vlan entered promiscuous mode [ 30.948713][ T281] device veth1_macvtap entered promiscuous mode [ 30.956594][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.964135][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.971835][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.980261][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.988729][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.997032][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.008343][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.016511][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.026773][ T279] device veth0_vlan entered promiscuous mode [ 31.040784][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.049009][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.057795][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.065790][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.074102][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.082272][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.090462][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.097989][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.108723][ T280] device veth1_macvtap entered promiscuous mode [ 31.116115][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.124367][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.132820][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.140865][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.149207][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.157594][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.165777][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.175866][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.184230][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.201693][ T279] device veth1_macvtap entered promiscuous mode [ 31.208916][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.216715][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.225287][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.246473][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.254825][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.263292][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.271832][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.280424][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.288996][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.310128][ T282] device veth0_vlan entered promiscuous mode [ 31.317127][ T280] request_module fs-gadgetfs succeeded, but still no fs? [ 31.328106][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.336655][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.344928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.353088][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.361731][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.370232][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.378599][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.386078][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.394051][ T281] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 31.404438][ T283] device veth0_vlan entered promiscuous mode [ 31.424318][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.438819][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.457211][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.465438][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.474795][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.482371][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.501734][ T282] device veth1_macvtap entered promiscuous mode [ 31.541202][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.551617][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.565590][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.579068][ T283] device veth1_macvtap entered promiscuous mode [ 31.597822][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.607315][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.615668][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.623783][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.632450][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.661240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.672808][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.681528][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.691439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.926024][ C0] hrtimer: interrupt took 25997 ns [ 32.018219][ T353] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 32.214481][ T363] device syzkaller0 entered promiscuous mode [ 32.288806][ T371] cgroup: syz.4.22 (371) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 32.307678][ T371] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 32.881313][ T408] bridge0: port 3(gretap0) entered blocking state [ 32.889650][ T408] bridge0: port 3(gretap0) entered disabled state [ 32.938929][ T408] device gretap0 entered promiscuous mode [ 32.950805][ T408] bridge0: port 3(gretap0) entered blocking state [ 32.957805][ T408] bridge0: port 3(gretap0) entered forwarding state [ 33.043712][ T432] device veth0_virt_wifi entered promiscuous mode [ 33.888801][ T283] cgroup: fork rejected by pids controller in /syz2 [ 33.920826][ T24] kauditd_printk_skb: 49 callbacks suppressed [ 33.920839][ T24] audit: type=1400 audit(1778084858.750:123): avc: denied { write } for pid=499 comm="syz.3.53" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.063238][ T24] audit: type=1400 audit(1778084858.890:124): avc: denied { create } for pid=514 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 34.494226][ T523] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.533366][ T24] audit: type=1400 audit(1778084859.360:125): avc: denied { create } for pid=561 comm="syz.3.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 34.632641][ T523] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.719428][ T523] device bridge_slave_0 entered promiscuous mode [ 34.735362][ T523] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.742602][ T523] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.750162][ T523] device bridge_slave_1 entered promiscuous mode [ 34.777933][ T568] device syzkaller0 entered promiscuous mode [ 34.846386][ T580] device syzkaller0 entered promiscuous mode [ 34.866278][ T583] device syzkaller0 entered promiscuous mode [ 34.924032][ T24] audit: type=1400 audit(1778084859.750:126): avc: denied { create } for pid=523 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.944018][ T523] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.951576][ T523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.958942][ T523] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.966038][ T523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.004855][ T24] audit: type=1400 audit(1778084859.750:127): avc: denied { write } for pid=523 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 35.047685][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.059283][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.090460][ T24] audit: type=1400 audit(1778084859.750:128): avc: denied { read } for pid=523 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 35.121126][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.140664][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.164252][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.188010][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.202127][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.209251][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.217390][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.225948][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.252964][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.260097][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.297610][ T24] audit: type=1400 audit(1778084860.130:129): avc: denied { write } for pid=603 comm="syz.3.83" name="cgroup.subtree_control" dev="cgroup2" ino=182 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 35.356196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.364782][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.406309][ T24] audit: type=1400 audit(1778084860.130:130): avc: denied { open } for pid=603 comm="syz.3.83" path="" dev="cgroup2" ino=182 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 35.429363][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.438251][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.525083][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.537820][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.556390][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.571701][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.601316][ T523] device veth0_vlan entered promiscuous mode [ 35.674606][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.683270][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.718182][ T615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.743193][ T615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.827520][ T24] audit: type=1400 audit(1778084860.660:131): avc: denied { ioctl } for pid=657 comm="syz.1.96" path="uts:[4026532285]" dev="nsfs" ino=4026532285 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 35.894989][ T523] device veth1_macvtap entered promiscuous mode [ 35.951863][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 35.966374][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 35.974795][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.042949][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.052699][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.465108][ T7] bridge0: port 3(gretap0) entered disabled state [ 36.483242][ T7] device gretap0 left promiscuous mode [ 36.502199][ T7] bridge0: port 3(gretap0) entered disabled state [ 36.766184][ T7] device bridge_slave_1 left promiscuous mode [ 36.772464][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.827985][ T7] device bridge_slave_0 left promiscuous mode [ 36.848789][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.877876][ T7] device veth1_macvtap left promiscuous mode [ 36.883950][ T7] device veth0_vlan left promiscuous mode [ 39.246594][ T802] IPv6: pim6reg1: Disabled Multicast RS [ 39.474075][ T806] device dummy0 entered promiscuous mode [ 40.066462][ T839] bridge0: port 3(gretap0) entered blocking state [ 40.075645][ T839] bridge0: port 3(gretap0) entered disabled state [ 40.093666][ T839] device gretap0 entered promiscuous mode [ 40.101014][ T839] bridge0: port 3(gretap0) entered blocking state [ 40.107523][ T839] bridge0: port 3(gretap0) entered forwarding state [ 40.259349][ T24] audit: type=1400 audit(1778084865.090:132): avc: denied { create } for pid=860 comm="syz.2.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 40.319027][ T865] device syzkaller0 entered promiscuous mode [ 40.584461][ T24] audit: type=1400 audit(1778084865.410:133): avc: denied { tracepoint } for pid=891 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 40.661219][ T890] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 40.669316][ T890] device syzkaller0 entered promiscuous mode [ 40.897516][ T914] device team_slave_0 entered promiscuous mode [ 40.905236][ T615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 40.926441][ T615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 41.339786][ T948] device syzkaller0 entered promiscuous mode [ 41.983914][ T972] ------------[ cut here ]------------ [ 42.041708][ T972] trace type BPF program uses run-time allocation [ 42.077299][ T972] WARNING: CPU: 0 PID: 972 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 42.137290][ T972] Modules linked in: [ 42.147382][ T972] CPU: 0 PID: 972 Comm: syz.1.192 Not tainted syzkaller #0 [ 42.154822][ T972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 42.195272][ T972] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 42.284151][ T972] Code: 85 e9 14 fe ff ff e8 99 d1 ef ff 31 c0 e9 15 fe ff ff e8 8d d1 ef ff c6 05 65 b3 4b 05 01 48 c7 c7 00 d0 25 85 e8 ca 0c 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 42.396218][ T972] RSP: 0018:ffffc90000d97448 EFLAGS: 00010246 [ 42.413925][ T972] RAX: 433e89e3a5501100 RBX: 0000000000000001 RCX: 0000000000080000 [ 42.519190][ T972] RDX: ffffc900018ec000 RSI: 0000000000001c55 RDI: 0000000000001c56 [ 42.566746][ T972] RBP: ffffc90000d97490 R08: ffff8881f7052fbf R09: 1ffff1103ee0a5f7 [ 42.643324][ T972] R10: dffffc0000000000 R11: ffffed103ee0a5f8 R12: ffff888114b80000 [ 42.738642][ T972] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff8881111ba800 [ 42.755593][ T972] FS: 00007f41ba7bd6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 42.775159][ T972] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.782068][ T972] CR2: 000000110c2454ac CR3: 000000010f295000 CR4: 00000000003506a0 [ 42.800097][ T972] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 42.824775][ T972] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 42.855774][ T972] Call Trace: [ 42.901292][ T972] ? __fdget+0x1a1/0x230 [ 42.905633][ T972] resolve_pseudo_ldimm64+0x55e/0x1060 [ 42.916228][ T972] ? bpf_check+0xdb10/0xdb10 [ 42.920983][ T972] ? kvmalloc_node+0x88/0x130 [ 42.935857][ T972] bpf_check+0x9058/0xdb10 [ 42.940577][ T972] ? bpf_get_btf_vmlinux+0x60/0x60 [ 42.945722][ T972] ? 0xffffffffa001a000 [ 42.953440][ T972] ? is_bpf_text_address+0x177/0x190 [ 42.973533][ T972] ? selinux_bpf_prog_alloc+0x51/0x140 [ 42.979579][ T972] ? __kernel_text_address+0xa0/0x100 [ 42.985089][ T972] ? unwind_get_return_address+0x4d/0x90 [ 43.000336][ T972] ? stack_trace_save+0xf0/0xf0 [ 43.005330][ T972] ? arch_stack_walk+0xee/0x140 [ 43.010865][ T972] ? stack_trace_save+0xa6/0xf0 [ 43.015844][ T972] ? stack_trace_snprint+0xf0/0xf0 [ 43.062964][ T972] ? __kasan_slab_alloc+0x69/0xf0 [ 43.068369][ T972] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.073920][ T972] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.079798][ T972] ? __kasan_kmalloc+0xec/0x110 [ 43.122088][ T972] ? __kasan_kmalloc+0xda/0x110 [ 43.127340][ T972] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 43.133100][ T972] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.138902][ T972] ? security_bpf_prog_alloc+0x62/0x90 [ 43.144441][ T972] ? bpf_prog_load+0x9d8/0x14a0 [ 43.156131][ T972] ? __se_sys_bpf+0x49a/0x740 [ 43.161274][ T972] ? __x64_sys_bpf+0x7b/0x90 [ 43.165966][ T972] ? do_syscall_64+0x31/0x40 [ 43.185085][ T972] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.214645][ T972] ? memset+0x35/0x40 [ 43.225102][ T972] ? bpf_obj_name_cpy+0x193/0x1e0 [ 43.235865][ T972] bpf_prog_load+0xfca/0x14a0 [ 43.283898][ T972] ? map_freeze+0x320/0x320 [ 43.366188][ T972] ? selinux_bpf+0xc7/0xf0 [ 43.375154][ T972] ? security_bpf+0x82/0xa0 [ 43.394789][ T972] __se_sys_bpf+0x49a/0x740 [ 43.439854][ T972] ? __x64_sys_bpf+0x90/0x90 [ 43.444517][ T972] ? ____fput+0x15/0x20 [ 43.486234][ T972] ? __kasan_check_read+0x11/0x20 [ 43.504740][ T972] __x64_sys_bpf+0x7b/0x90 [ 43.524945][ T972] do_syscall_64+0x31/0x40 [ 43.556220][ T972] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.579687][ T972] RIP: 0033:0x7f41bbd62dd9 [ 43.607445][ T972] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 43.641441][ T972] RSP: 002b:00007f41ba7bd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.650350][ T972] RAX: ffffffffffffffda RBX: 00007f41bbfdbfa0 RCX: 00007f41bbd62dd9 [ 43.659375][ T972] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 43.667659][ T972] RBP: 00007f41bbdf8d69 R08: 0000000000000000 R09: 0000000000000000 [ 43.675993][ T972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 43.684495][ T972] R13: 00007f41bbfdc038 R14: 00007f41bbfdbfa0 R15: 00007fffbb748938 [ 43.703445][ T972] ---[ end trace 3fe43511d9bf2b46 ]--- [ 45.465928][ T1129] geneve1: tun_chr_ioctl cmd 1074025675 [ 45.471678][ T1129] geneve1: persist enabled [ 45.499089][ T1127] geneve1: tun_chr_ioctl cmd 1074025675 [ 45.515622][ T1127] geneve1: persist disabled [ 45.824207][ T24] audit: type=1400 audit(1778084870.650:134): avc: denied { create } for pid=1175 comm="syz.4.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 46.186632][ T24] audit: type=1400 audit(1778084871.020:135): avc: denied { create } for pid=1209 comm="syz.4.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 46.372518][ T634] syzkaller0: tun_net_xmit 76 [ 46.377374][ T634] syzkaller0: tun_net_xmit 48 [ 46.396403][ C1] syzkaller0: tun_net_xmit 76 [ 46.486355][ T1168] syzkaller0: delete flow: hash 1375914046 index 1 [ 46.621846][ T1227] device syzkaller0 entered promiscuous mode [ 46.916625][ T24] audit: type=1400 audit(1778084871.750:136): avc: denied { create } for pid=1244 comm="syz.3.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 47.759802][ T1316] device syzkaller0 entered promiscuous mode [ 49.377083][ T1401] bridge0: port 3(ip6gretap0) entered blocking state [ 49.386179][ T1401] bridge0: port 3(ip6gretap0) entered disabled state [ 49.404912][ T1401] device ip6gretap0 entered promiscuous mode [ 49.411516][ T1401] bridge0: port 3(ip6gretap0) entered blocking state [ 49.418276][ T1401] bridge0: port 3(ip6gretap0) entered forwarding state [ 49.988210][ T24] audit: type=1400 audit(1778084874.820:137): avc: denied { create } for pid=1425 comm="syz.4.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 50.091704][ T24] audit: type=1400 audit(1778084874.850:138): avc: denied { create } for pid=1425 comm="syz.4.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 50.637006][ T24] audit: type=1400 audit(1778084875.470:139): avc: denied { create } for pid=1440 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 52.933988][ T1570] +: renamed from team_slave_1 [ 53.070312][ T1575] device syzkaller0 entered promiscuous mode [ 53.297587][ T1582] device wg2 entered promiscuous mode [ 53.438126][ T1589] : port 1(dummy0) entered blocking state [ 53.444011][ T1589] : port 1(dummy0) entered disabled state [ 53.491174][ T1589] device dummy0 entered promiscuous mode [ 54.371106][ T1626] device syzkaller0 entered promiscuous mode [ 54.491738][ T24] audit: type=1400 audit(1778084879.320:140): avc: denied { ioctl } for pid=1641 comm="syz.4.378" path="socket:[19750]" dev="sockfs" ino=19750 ioctlcmd=0x54e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 54.738287][ T1669] device syzkaller0 entered promiscuous mode [ 54.771341][ T1667] device syzkaller0 entered promiscuous mode [ 54.817008][ T1671] device syzkaller0 entered promiscuous mode [ 55.178819][ T1706] device wg2 entered promiscuous mode [ 55.418978][ T1737] device syzkaller0 entered promiscuous mode [ 55.434526][ T1740] tap0: tun_chr_ioctl cmd 1074812118 [ 55.539530][ T1747] device syzkaller0 entered promiscuous mode [ 55.767344][ T1770] device xfrm0 entered promiscuous mode [ 55.856635][ T1783] : port 1(ip6gretap0) entered blocking state [ 55.863251][ T1783] : port 1(ip6gretap0) entered disabled state [ 55.877107][ T1783] device ip6gretap0 entered promiscuous mode [ 55.908467][ T1783] device ip6gretap0 left promiscuous mode [ 55.919409][ T1783] : port 1(ip6gretap0) entered disabled state [ 56.084882][ T24] audit: type=1400 audit(1778084880.910:141): avc: denied { create } for pid=1803 comm="syz.0.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 57.442460][ T1871] device syzkaller0 entered promiscuous mode [ 57.661114][ T1896] device syzkaller0 entered promiscuous mode [ 57.752465][ T1899] device aaaaaaaaaaaaaaa entered promiscuous mode [ 57.779202][ T1898] device syzkaller0 entered promiscuous mode [ 58.121371][ T1920] nr0: port 1(macsec0) entered blocking state [ 58.156110][ T1920] nr0: port 1(macsec0) entered disabled state [ 58.197871][ T1920] device macsec0 entered promiscuous mode [ 58.834766][ T1949] device syzkaller0 entered promiscuous mode [ 60.307217][ T2006] device syzkaller0 entered promiscuous mode [ 60.355819][ T24] audit: type=1400 audit(1778084885.180:142): avc: denied { create } for pid=2005 comm="syz.0.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 60.680303][ T2017] device syzkaller0 entered promiscuous mode [ 60.826047][ T2031] geneve1: tun_chr_ioctl cmd 1074025673 [ 61.599091][ T2074] : port 1(dummy0) entered blocking state [ 61.668188][ T2074] : port 1(dummy0) entered disabled state [ 62.064947][ T2110] device syzkaller0 entered promiscuous mode [ 62.323957][ T2130] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 62.403554][ T2141] device syzkaller0 entered promiscuous mode [ 62.730247][ T2154] device syzkaller0 entered promiscuous mode [ 64.616327][ T2276] bridge0: port 3(gretap0) entered disabled state [ 64.624128][ T2276] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.633767][ T2276] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.151867][ T2479] syz.3.628 (2479) used obsolete PPPIOCDETACH ioctl [ 67.261343][ T2482] device syzkaller0 entered promiscuous mode [ 67.319139][ T24] audit: type=1400 audit(1778084892.150:143): avc: denied { create } for pid=2485 comm="syz.2.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 67.511467][ T24] audit: type=1400 audit(1778084892.340:144): avc: denied { create } for pid=2491 comm="syz.3.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 68.344092][ T2550] device syzkaller0 entered promiscuous mode [ 68.564034][ T2581] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 68.570254][ T2581] pim6reg0: linktype set to 768 [ 68.590681][ T2581] pim6reg0: tun_chr_ioctl cmd 1074025684 [ 69.621051][ T24] audit: type=1400 audit(1778084894.450:145): avc: denied { create } for pid=2646 comm="syz.2.679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 71.857586][ T2767] device gretap0 left promiscuous mode [ 71.884657][ T2767] bridge0: port 3(gretap0) entered disabled state [ 71.909622][ T2767] device bridge_slave_1 left promiscuous mode [ 71.929428][ T2767] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.962748][ T2767] device bridge_slave_0 left promiscuous mode [ 71.972601][ T2767] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.196233][ T2783] cgroup: fork rejected by pids controller in /syz4 [ 72.742358][ T2812] device syzkaller0 entered promiscuous mode [ 72.763165][ T2814] device syzkaller0 entered promiscuous mode [ 72.786561][ T2814] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 72.933920][ T2803] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.960421][ T2803] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.968148][ T2803] device bridge_slave_0 entered promiscuous mode [ 72.975788][ T2803] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.982974][ T2803] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.990783][ T2803] device bridge_slave_1 entered promiscuous mode [ 73.109111][ T2803] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.116233][ T2803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.123565][ T2803] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.130649][ T2803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.272280][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.287002][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.299313][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.341039][ T347] bridge0: port 3(ip6gretap0) entered disabled state [ 73.372626][ T347] device ip6gretap0 left promiscuous mode [ 73.406422][ T347] bridge0: port 3(ip6gretap0) entered disabled state [ 73.435698][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.446357][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.465189][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.472310][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.498501][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.516341][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.534424][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.541559][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.578213][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 73.604139][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.662655][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 73.682706][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.705647][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 73.724528][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.766443][ T2803] device veth0_vlan entered promiscuous mode [ 73.773251][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 73.787556][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.813173][ T2803] device veth1_macvtap entered promiscuous mode [ 73.837698][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.851205][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.877955][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.894973][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.914959][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 73.987350][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.001363][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.035229][ T615] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.059219][ T615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.126862][ T2872] device veth1_macvtap left promiscuous mode [ 74.133001][ T2872] device macsec0 entered promiscuous mode [ 74.655674][ T2930] device syzkaller0 entered promiscuous mode [ 74.887220][ T347] device dummy0 left promiscuous mode [ 74.892860][ T347] : port 1(dummy0) entered disabled state [ 74.936945][ T347] device bridge_slave_1 left promiscuous mode [ 74.943654][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.958022][ T347] device bridge_slave_0 left promiscuous mode [ 74.969576][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.993716][ T347] device veth1_macvtap left promiscuous mode [ 75.025304][ T347] device veth0_vlan left promiscuous mode [ 75.347170][ T2957] IPv6: pim6reg1: Disabled Multicast RS [ 75.854046][ T3005] device syzkaller0 entered promiscuous mode [ 77.045622][ T3061] device bridge0 entered promiscuous mode [ 77.410751][ T3083] tap0: tun_chr_ioctl cmd 35108 [ 77.958899][ T3100] b‹¡Y­4`Ò˜: renamed from lo [ 78.455495][ T3122] device syzkaller0 entered promiscuous mode [ 78.525630][ T24] audit: type=1400 audit(1778084903.350:146): avc: denied { create } for pid=3125 comm="syz.4.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 79.773489][ T24] audit: type=1400 audit(1778084904.600:147): avc: denied { create } for pid=3200 comm="syz.3.848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 79.813195][ T3202] device syzkaller0 entered promiscuous mode [ 80.253181][ T3228] bridge0: port 3(veth0_to_bridge) entered blocking state [ 80.281469][ T3228] bridge0: port 3(veth0_to_bridge) entered disabled state [ 80.321262][ T3228] device veth0_to_bridge entered promiscuous mode [ 80.334107][ T3228] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 80.348506][ T3228] bridge0: port 3(veth0_to_bridge) entered blocking state [ 80.355687][ T3228] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 80.408639][ T3240] syz.1.860[3240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.408693][ T3240] syz.1.860[3240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.171401][ T24] audit: type=1400 audit(1778084906.000:148): avc: denied { append } for pid=3308 comm="syz.2.882" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 81.432107][ T3322] tun0: tun_chr_ioctl cmd 1074025675 [ 81.445246][ T3322] tun0: persist enabled [ 81.456430][ T3322] tun0: tun_chr_ioctl cmd 1074025675 [ 81.489307][ T3322] tun0: persist enabled [ 82.247744][ T3391] device veth0_vlan left promiscuous mode [ 82.256475][ T3391] device veth0_vlan entered promiscuous mode [ 82.426020][ T3405] @0Ù: renamed from bond_slave_1 [ 82.713402][ T3414] device syzkaller0 entered promiscuous mode [ 82.829257][ T3417] device syzkaller0 entered promiscuous mode [ 83.271727][ T3462] device syzkaller0 entered promiscuous mode [ 84.139619][ T3523] : port 2(ip6gretap0) entered blocking state [ 84.164346][ T3523] : port 2(ip6gretap0) entered disabled state [ 84.215138][ T3523] device ip6gretap0 entered promiscuous mode [ 84.262691][ T3528] device ip6gretap0 left promiscuous mode [ 84.297389][ T3528] : port 2(ip6gretap0) entered disabled state [ 85.358390][ T3618] syz.3.968[3618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.358443][ T3618] syz.3.968[3618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.290728][ T3684] device wg2 left promiscuous mode [ 86.400380][ T3676] device wg2 entered promiscuous mode [ 86.474347][ T3708] -1: renamed from syzkaller0 [ 86.898094][ T24] audit: type=1400 audit(1778084911.730:149): avc: denied { create } for pid=3736 comm="syz.3.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 87.296731][ T3735] device syzkaller0 entered promiscuous mode [ 87.512462][ T3746] device wg2 entered promiscuous mode [ 87.847514][ T3771] device syzkaller0 entered promiscuous mode [ 88.042923][ T3790] device team_slave_0 entered promiscuous mode [ 88.056662][ T615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.067188][ T615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.708164][ T3851] device syzkaller0 entered promiscuous mode [ 90.213281][ T3914] ref_ctr_offset mismatch. inode: 0x45e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 90.293912][ T3913] ref_ctr_offset mismatch. inode: 0x45e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 91.461101][ T3953] ³þ: renamed from bond_slave_0 [ 91.508912][ T3953] device syzkaller0 entered promiscuous mode [ 91.707404][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 91.733554][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 91.763333][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 91.780226][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 91.797631][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 91.829349][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 91.848337][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 91.861167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 91.874015][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 91.887118][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 92.699463][ T3983] device syzkaller0 entered promiscuous mode [ 93.956775][ T4070] device syzkaller0 entered promiscuous mode [ 94.053404][ T4073] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 94.274049][ T4062] device syzkaller0 entered promiscuous mode [ 96.384574][ T4080] device syzkaller0 entered promiscuous mode [ 96.716174][ C0] net_ratelimit: 34495 callbacks suppressed [ 96.716189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 96.734492][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 96.746829][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 96.759165][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 96.771476][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 96.783808][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 96.796197][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 96.808532][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 96.820875][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 96.833192][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 99.678999][ T4208] device syzkaller0 entered promiscuous mode [ 101.726020][ C1] net_ratelimit: 40657 callbacks suppressed [ 101.726035][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 101.733577][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 101.744148][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 101.768113][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 101.774195][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 101.780495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 101.804265][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 101.807646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 101.816564][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 101.840272][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 106.736019][ C1] net_ratelimit: 63795 callbacks suppressed [ 106.736034][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 106.748176][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 106.754217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 106.778030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 106.787514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 106.790179][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 106.813957][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 106.820150][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 106.826064][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 106.849963][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 111.746030][ C1] net_ratelimit: 68393 callbacks suppressed [ 111.746043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 111.746306][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 111.752255][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 111.765013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 111.776239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 111.788920][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 111.800043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 111.812765][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 111.823960][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 111.836814][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 116.756037][ C1] net_ratelimit: 107263 callbacks suppressed [ 116.756066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 116.756719][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 116.762451][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 116.775286][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 116.786721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 116.799539][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 116.810547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 116.823631][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 116.834698][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 116.847648][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 121.766028][ C1] net_ratelimit: 99316 callbacks suppressed [ 121.766042][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 121.766660][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 121.772210][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 121.784995][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 121.796242][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 121.809320][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 121.820227][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 121.836965][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 121.844133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 121.857144][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 126.776005][ C1] net_ratelimit: 101005 callbacks suppressed [ 126.776019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 126.776736][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 126.782316][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 126.795075][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 126.806209][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 126.819094][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 126.830140][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 126.842888][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 126.854008][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 126.866926][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 131.786048][ C0] net_ratelimit: 78580 callbacks suppressed [ 131.786063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 131.789388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 131.793339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 131.809821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 131.817367][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 131.833433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 131.841180][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 131.858383][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 131.865108][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 131.882408][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 136.795997][ C1] net_ratelimit: 76772 callbacks suppressed [ 136.796010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 136.809279][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 136.814160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 136.837843][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 136.849815][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 136.855264][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 136.861866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 136.885811][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 136.897781][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 136.897889][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 141.806008][ C1] net_ratelimit: 84103 callbacks suppressed [ 141.806022][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 141.809491][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 141.812103][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 141.847831][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 141.859941][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 141.871935][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 141.882218][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 141.884046][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 141.907863][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 141.919872][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 146.815979][ C0] net_ratelimit: 88066 callbacks suppressed [ 146.815994][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 146.816067][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 146.822909][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 146.843218][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 146.856095][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 146.868015][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 146.871095][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 146.888559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 146.895172][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 146.909007][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 151.826012][ C1] net_ratelimit: 68710 callbacks suppressed [ 151.826068][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 151.826692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 151.835860][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 151.844937][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 151.862241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 151.868873][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 151.884868][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 151.892786][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 151.911363][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 151.916975][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 156.835991][ C1] net_ratelimit: 70768 callbacks suppressed [ 156.836005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 156.849514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 156.854344][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 156.878041][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 156.888635][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 156.890265][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 156.914120][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 156.922867][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 156.926200][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 156.950061][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 161.846007][ C1] net_ratelimit: 76220 callbacks suppressed [ 161.846021][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 161.847652][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 161.852220][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 161.870581][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 161.876142][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 161.893259][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 161.900088][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 161.934740][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 161.935913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 161.956557][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 166.856025][ C0] net_ratelimit: 81574 callbacks suppressed [ 166.856039][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 166.860831][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 166.862315][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 166.881923][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 166.886262][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 166.909910][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 166.914542][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 166.922288][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 166.938480][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 166.957228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 171.865977][ C0] net_ratelimit: 81432 callbacks suppressed [ 171.865992][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 171.867241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.872175][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 171.887854][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.896210][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 171.914701][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.919994][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 171.936273][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.944764][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 171.959384][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.876129][ C0] net_ratelimit: 78644 callbacks suppressed [ 176.876144][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 176.878837][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.882290][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 176.903293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.906174][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 176.920207][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.930110][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 176.947950][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.954949][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 176.971542][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.886010][ C1] net_ratelimit: 100962 callbacks suppressed [ 181.886033][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.889249][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 181.892309][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.911292][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 181.916266][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.933159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 181.940073][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.975920][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.976697][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 181.988097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.895965][ C1] net_ratelimit: 100648 callbacks suppressed [ 186.895979][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.896333][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 186.902154][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.932247][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 186.938166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.957064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 186.962122][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.979634][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 186.986171][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 187.001354][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 191.906021][ C0] net_ratelimit: 77676 callbacks suppressed [ 191.906035][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 191.908286][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 191.912095][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 191.930976][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 191.936512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 191.953559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 191.961029][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 191.974837][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 191.984146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 192.000248][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 196.915981][ C1] net_ratelimit: 67008 callbacks suppressed [ 196.915994][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 196.929009][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 196.934283][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 196.950991][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 196.957866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 196.976038][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 196.981799][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.005674][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.006088][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 197.017807][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 201.925998][ C1] net_ratelimit: 78261 callbacks suppressed [ 201.926013][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 201.927597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 201.932247][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 201.966155][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 201.968161][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 201.984936][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 201.991857][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 202.009461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 202.015879][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 202.039689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 206.935993][ C1] net_ratelimit: 86862 callbacks suppressed [ 206.936007][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 206.954048][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 206.955986][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 206.966144][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 206.981768][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 206.990122][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 207.006854][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 207.014029][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 207.037809][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 207.039261][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 211.945957][ C0] net_ratelimit: 87899 callbacks suppressed [ 211.945970][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 211.945978][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 211.946165][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 211.952165][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 211.964104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 211.976009][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 211.987962][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 212.000493][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 212.012087][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 212.024728][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 216.955973][ C0] net_ratelimit: 96532 callbacks suppressed [ 216.955988][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 216.956010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 216.962511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 216.974171][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 216.987255][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 216.998254][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 217.010272][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 217.022047][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 217.033998][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 217.045908][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.965966][ C1] net_ratelimit: 78377 callbacks suppressed [ 221.965981][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.977119][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 221.984125][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.001705][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 222.007948][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.022908][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 222.031777][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.055532][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 222.055608][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.079587][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.976085][ C0] net_ratelimit: 71270 callbacks suppressed [ 226.976100][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 226.977279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.982351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 227.000237][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.006162][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 227.022375][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.030551][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 227.044225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.054674][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 227.071937][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 231.985971][ C1] net_ratelimit: 79329 callbacks suppressed [ 231.985987][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 231.993332][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 232.004117][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 232.020432][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 232.027876][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 232.047688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 232.051839][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 232.075577][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 232.078575][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 232.087660][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 236.995969][ C1] net_ratelimit: 80861 callbacks suppressed [ 236.995984][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.012750][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 237.014068][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.036005][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 237.037825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.052897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 237.061798][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.085680][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.091861][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 237.097722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.005934][ C1] net_ratelimit: 85427 callbacks suppressed [ 242.005949][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.020596][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 242.024201][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.042129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 242.047778][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.065534][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 242.071782][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.095551][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.099669][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 242.107625][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.015939][ C1] net_ratelimit: 86610 callbacks suppressed [ 247.015961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.028403][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 247.034248][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.055598][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 247.057994][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.075871][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 247.082002][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.105788][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.110080][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 247.117869][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 252.025989][ C0] net_ratelimit: 65711 callbacks suppressed [ 252.026006][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 252.026292][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 252.032209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 252.047928][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 252.056711][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 252.075523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 252.080848][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 252.094796][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 252.104159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 252.120967][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 254.168198][ T26] INFO: task syz-executor:279 blocked for more than 123 seconds. [ 254.186369][ T26] Tainted: G W syzkaller #0 [ 254.192746][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 254.457892][ T26] task:syz-executor state:D stack: 0 pid: 279 ppid: 1 flags:0x00004006 [ 254.597440][ T26] Call Trace: [ 254.600827][ T26] __schedule+0xb53/0x1320 [ 254.605274][ T26] ? __sched_text_start+0x8/0x8 [ 254.723815][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 254.907892][ T26] ? __kasan_check_write+0x14/0x20 [ 254.913173][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 254.981513][ T26] schedule+0x13c/0x1d0 [ 254.985737][ T26] schedule_preempt_disabled+0x13/0x20 [ 255.448351][ T26] __mutex_lock+0x6cc/0xc60 [ 255.452922][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 255.717004][ T26] ? memset+0x35/0x40 [ 255.721059][ T26] __mutex_lock_slowpath+0xe/0x10 [ 255.886715][ T26] mutex_lock+0xdb/0xf0 [ 255.890944][ T26] ? mutex_trylock+0xa0/0xa0 [ 255.895552][ T26] ? security_file_free+0xc7/0xe0 [ 255.988236][ T26] ? tun_chr_open+0x540/0x540 [ 255.992973][ T26] rtnl_lock+0x15/0x20 [ 256.307315][ T26] tun_chr_close+0x40/0x140 [ 256.311988][ T26] __fput+0x2fb/0x770 [ 256.360315][ T26] ____fput+0x15/0x20 [ 256.364366][ T26] task_work_run+0x127/0x190 [ 256.407339][ T26] do_exit+0xa90/0x2500 [ 256.411562][ T26] ? put_task_struct+0x90/0x90 [ 256.437141][ T26] ? __kasan_check_write+0x14/0x20 [ 256.508817][ T26] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 256.514428][ T26] ? _raw_spin_lock+0xf0/0xf0 [ 256.536696][ T26] ? __kasan_check_write+0x14/0x20 [ 256.541867][ T26] ? _raw_spin_lock_irq+0x95/0xf0 [ 256.567319][ T26] ? _raw_spin_lock_irqsave+0x130/0x130 [ 256.572932][ T26] do_group_exit+0x141/0x310 [ 256.596110][ T26] ? __kasan_check_write+0x14/0x20 [ 256.601289][ T26] get_signal+0xf7d/0x12e0 [ 256.605735][ T26] arch_do_signal_or_restart+0xe2/0x11d0 [ 256.625960][ T26] ? kernel_waitid+0x3d0/0x3d0 [ 256.630783][ T26] ? security_file_free+0xc7/0xe0 [ 256.716831][ T26] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 256.722534][ T26] ? __x64_sys_wait4+0x1b4/0x230 [ 256.747379][ T26] ? kernel_wait+0x1c0/0x1c0 [ 256.752039][ T26] exit_to_user_mode_loop+0xa2/0xe0 [ 256.759867][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 256.765369][ T26] syscall_exit_to_user_mode+0x1d/0x40 [ 256.797509][ T26] do_syscall_64+0x3d/0x40 [ 256.802010][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 256.937088][ T26] RIP: 0033:0x7f41bbd1df57 [ 256.941569][ T26] RSP: 002b:00007fffbb748c50 EFLAGS: 00000202 ORIG_RAX: 000000000000003d [ 256.966666][ T26] RAX: fffffffffffffe00 RBX: 00005555758b7500 RCX: 00007f41bbd1df57 [ 256.974710][ T26] RDX: 0000000040000000 RSI: 00007fffbb748cdc RDI: ffffffffffffffff [ 256.997380][ T26] RBP: 00007fffbb748cdc R08: 0000000000000000 R09: 0000000000000000 [ 257.005415][ T26] R10: 0000000000000000 R11: 0000000000000202 R12: 00000000000000f0 [ 257.036181][ C0] net_ratelimit: 58003 callbacks suppressed [ 257.036204][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 257.037571][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.042330][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 257.062595][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.066258][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 257.085787][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.090630][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 257.109225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.115184][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 257.129425][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.317116][ T26] R13: 00005555758ca8e0 R14: 0000000000018706 R15: 00007fffbb748d30 [ 257.336053][ T26] INFO: task kworker/u4:4:347 blocked for more than 126 seconds. [ 257.343832][ T26] Tainted: G W syzkaller #0 [ 257.576739][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 257.585471][ T26] task:kworker/u4:4 state:D stack: 0 pid: 347 ppid: 2 flags:0x00004000 [ 257.626949][ T26] Workqueue: netns cleanup_net [ 257.631780][ T26] Call Trace: [ 257.635097][ T26] __schedule+0xb53/0x1320 [ 257.657320][ T26] ? __sched_text_start+0x8/0x8 [ 257.662278][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 257.686676][ T26] ? __kasan_check_write+0x14/0x20 [ 257.691851][ T26] ? kthread_data+0x50/0xc0 [ 257.698416][ T26] ? wq_worker_sleeping+0x60/0x200 [ 257.847505][ T26] schedule+0x13c/0x1d0 [ 257.851717][ T26] schedule_preempt_disabled+0x13/0x20 [ 257.876168][ T26] __mutex_lock+0x6cc/0xc60 [ 257.880729][ T26] ? pcpu_free_area+0x9c0/0xbe0 [ 257.885600][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 257.917047][ T26] ? free_percpu+0xfd/0xa20 [ 257.921620][ T26] __mutex_lock_slowpath+0xe/0x10 [ 258.138767][ T26] mutex_lock+0xdb/0xf0 [ 258.142992][ T26] ? mutex_trylock+0xa0/0xa0 [ 258.166637][ T26] ? kobject_put+0x1a8/0x270 [ 258.171290][ T26] ? put_device+0x1f/0x30 [ 258.175648][ T26] ? free_netdev+0x384/0x480 [ 258.217212][ T26] rtnl_lock+0x15/0x20 [ 258.221345][ T26] netdev_run_todo+0xb5b/0xd50 [ 258.235963][ T26] ? netdev_refcnt_read+0x1d0/0x1d0 [ 258.241222][ T26] ? unregister_netdevice_queue+0x1aa/0x370 [ 258.266209][ T26] ? list_netdevice+0x4c0/0x4c0 [ 258.271123][ T26] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 258.306825][ T26] rtnl_unlock+0xe/0x10 [ 258.311054][ T26] ip_tunnel_delete_nets+0x350/0x3a0 [ 258.337096][ T26] ? ip_tunnel_bind_dev+0x740/0x740 [ 258.342384][ T26] ? xfrmi6_err+0x640/0x640 [ 258.366362][ T26] erspan_exit_batch_net+0x22/0x30 [ 258.371558][ T26] ? erspan_init_net+0x30/0x30 [ 258.379917][ T26] cleanup_net+0x603/0xb80 [ 258.384383][ T26] ? __kasan_check_write+0x14/0x20 [ 258.407135][ T26] ? ops_init+0x4a0/0x4a0 [ 258.411522][ T26] ? read_word_at_a_time+0x12/0x20 [ 258.437443][ T26] ? strscpy+0x9b/0x290 [ 258.441667][ T26] process_one_work+0x6e1/0xba0 [ 258.448586][ T26] worker_thread+0xa6a/0x13c0 [ 258.453301][ T26] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 258.476400][ T26] ? __kasan_check_read+0x11/0x20 [ 258.481490][ T26] kthread+0x346/0x3d0 [ 258.485697][ T26] ? worker_clr_flags+0x190/0x190 [ 258.667110][ T26] ? kthread_blkcg+0xd0/0xd0 [ 258.671861][ T26] ret_from_fork+0x1f/0x30 [ 258.687782][ T26] INFO: task kworker/1:4:411 blocked for more than 127 seconds. [ 258.695566][ T26] Tainted: G W syzkaller #0 [ 258.737268][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 258.755947][ T26] task:kworker/1:4 state:D stack: 0 pid: 411 ppid: 2 flags:0x00004000 [ 258.765228][ T26] Workqueue: ipv6_addrconf addrconf_dad_work [ 258.797504][ T26] Call Trace: [ 258.800865][ T26] __schedule+0xb53/0x1320 [ 258.805297][ T26] ? __sched_text_start+0x8/0x8 [ 258.826381][ T26] ? _raw_spin_unlock_irq+0x4e/0x70 [ 258.831638][ T26] ? wq_worker_sleeping+0x196/0x200 [ 258.846546][ T26] schedule+0x13c/0x1d0 [ 258.850771][ T26] schedule_preempt_disabled+0x13/0x20 [ 259.018506][ T26] __mutex_lock+0x6cc/0xc60 [ 259.023084][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 259.167599][ T26] __mutex_lock_slowpath+0xe/0x10 [ 259.172845][ T26] mutex_lock+0xdb/0xf0 [ 259.186626][ T26] ? mutex_trylock+0xa0/0xa0 [ 259.191426][ T26] rtnl_lock+0x15/0x20 [ 259.195530][ T26] addrconf_dad_work+0xca/0x1440 [ 259.237261][ T26] ? ipv6_get_saddr_eval+0xf70/0xf70 [ 259.242615][ T26] ? __kasan_check_write+0x14/0x20 [ 259.266321][ T26] ? __kasan_check_read+0x11/0x20 [ 259.271452][ T26] ? read_word_at_a_time+0x12/0x20 [ 259.278998][ T26] ? strscpy+0x9b/0x290 [ 259.283197][ T26] process_one_work+0x6e1/0xba0 [ 259.356186][ T26] worker_thread+0xa6a/0x13c0 [ 259.567420][ T26] kthread+0x346/0x3d0 [ 259.571555][ T26] ? worker_clr_flags+0x190/0x190 [ 259.597258][ T26] ? kthread_blkcg+0xd0/0xd0 [ 259.601920][ T26] ret_from_fork+0x1f/0x30 [ 259.627105][ T26] INFO: task syz-executor:523 blocked for more than 128 seconds. [ 259.635000][ T26] Tainted: G W syzkaller #0 [ 260.118708][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 260.147143][ T26] task:syz-executor state:D stack: 0 pid: 523 ppid: 1 flags:0x00004006 [ 260.158746][ T26] Call Trace: [ 260.162071][ T26] __schedule+0xb53/0x1320 [ 260.376879][ T26] ? __sched_text_start+0x8/0x8 [ 260.381812][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 260.407089][ T26] ? __kasan_check_write+0x14/0x20 [ 260.412260][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 260.437239][ T26] schedule+0x13c/0x1d0 [ 260.441457][ T26] schedule_preempt_disabled+0x13/0x20 [ 260.448969][ T26] __mutex_lock+0x6cc/0xc60 [ 260.453518][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 260.476295][ T26] ? memset+0x35/0x40 [ 260.480341][ T26] __mutex_lock_slowpath+0xe/0x10 [ 260.485384][ T26] mutex_lock+0xdb/0xf0 [ 260.507019][ T26] ? mutex_trylock+0xa0/0xa0 [ 260.511799][ T26] ? security_file_free+0xc7/0xe0 [ 260.537458][ T26] ? tun_chr_open+0x540/0x540 [ 260.542201][ T26] rtnl_lock+0x15/0x20 [ 260.566409][ T26] tun_chr_close+0x40/0x140 [ 260.691432][ T26] __fput+0x2fb/0x770 [ 260.695481][ T26] ____fput+0x15/0x20 [ 260.716522][ T26] task_work_run+0x127/0x190 [ 260.721180][ T26] do_exit+0xa90/0x2500 [ 260.725357][ T26] ? __kasan_check_read+0x11/0x20 [ 260.747604][ T26] ? put_task_struct+0x90/0x90 [ 260.752428][ T26] ? pipe_read+0xf16/0x1010 [ 260.776797][ T26] ? __kasan_check_write+0x14/0x20 [ 260.781978][ T26] ? _raw_spin_lock_irq+0x95/0xf0 [ 260.789395][ T26] ? _raw_spin_lock_irqsave+0x130/0x130 [ 260.795011][ T26] do_group_exit+0x141/0x310 [ 260.896564][ T26] ? __kasan_check_write+0x14/0x20 [ 260.901757][ T26] get_signal+0xf7d/0x12e0 [ 260.917398][ T26] ? security_file_permission+0x83/0xa0 [ 260.922993][ T26] arch_do_signal_or_restart+0xe2/0x11d0 [ 260.947265][ T26] ? kernel_read+0x70/0x70 [ 260.951743][ T26] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 260.976003][ T26] ? __kasan_check_read+0x11/0x20 [ 260.981082][ T26] ? __fdget_pos+0x1f7/0x380 [ 260.985696][ T26] ? vfs_write+0xdc0/0xdc0 [ 261.006130][ T26] ? ____fput+0x15/0x20 [ 261.010495][ T26] ? task_work_run+0x170/0x190 [ 261.015275][ T26] exit_to_user_mode_loop+0xa2/0xe0 [ 261.036556][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 261.042085][ T26] syscall_exit_to_user_mode+0x1d/0x40 [ 261.137672][ T26] do_syscall_64+0x3d/0x40 [ 261.142156][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 261.161702][ T26] RIP: 0033:0x7fdb4df88f57 [ 261.177615][ T26] RSP: 002b:00007ffd07a04730 EFLAGS: 00000202 ORIG_RAX: 0000000000000000 [ 261.198788][ T26] RAX: fffffffffffffe00 RBX: 000055556cd22500 RCX: 00007fdb4df88f57 [ 261.447061][ T26] RDX: 0000000000000030 RSI: 00007ffd07a04810 RDI: 00000000000000f9 [ 261.455200][ T26] RBP: 00007ffd07a047bc R08: 0000000000000000 R09: 0000000000000000 [ 261.497438][ T26] R10: 0000000000000000 R11: 0000000000000202 R12: 00000000000000d5 [ 261.505557][ T26] R13: 00000000000927c0 R14: 000000000001dd64 R15: 00007ffd07a04810 [ 261.526522][ T26] INFO: task syz-executor:2803 blocked for more than 130 seconds. [ 261.534381][ T26] Tainted: G W syzkaller #0 [ 261.757708][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 261.786747][ T26] task:syz-executor state:D stack: 0 pid: 2803 ppid: 1 flags:0x00004006 [ 261.816091][ T26] Call Trace: [ 261.819453][ T26] __schedule+0xb53/0x1320 [ 261.823889][ T26] ? __sched_text_start+0x8/0x8 [ 262.045941][ C1] net_ratelimit: 59986 callbacks suppressed [ 262.045956][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.060816][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 262.064219][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.079925][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 262.087916][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.105123][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 262.111862][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.135728][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.142279][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 262.147924][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.177875][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 262.183138][ T26] ? __kasan_check_write+0x14/0x20 [ 262.191332][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 262.199144][ T26] schedule+0x13c/0x1d0 [ 262.203332][ T26] schedule_preempt_disabled+0x13/0x20 [ 262.210812][ T26] __mutex_lock+0x6cc/0xc60 [ 262.215350][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 262.224176][ T26] ? memset+0x35/0x40 [ 262.316260][ T26] __mutex_lock_slowpath+0xe/0x10 [ 262.321441][ T26] mutex_lock+0xdb/0xf0 [ 262.325616][ T26] ? mutex_trylock+0xa0/0xa0 [ 262.348812][ T26] ? security_file_free+0xc7/0xe0 [ 262.353991][ T26] ? tun_chr_open+0x540/0x540 [ 262.377607][ T26] rtnl_lock+0x15/0x20 [ 262.381822][ T26] tun_chr_close+0x40/0x140 [ 262.388789][ T26] __fput+0x2fb/0x770 [ 262.392810][ T26] ____fput+0x15/0x20 [ 262.417603][ T26] task_work_run+0x127/0x190 [ 262.422344][ T26] do_exit+0xa90/0x2500 [ 262.446479][ T26] ? __kasan_check_read+0x11/0x20 [ 262.698635][ T26] ? put_task_struct+0x90/0x90 [ 262.703515][ T26] ? pipe_read+0xf16/0x1010 [ 262.726326][ T26] ? __kasan_check_write+0x14/0x20 [ 262.731580][ T26] ? _raw_spin_lock_irq+0x95/0xf0 [ 262.757435][ T26] ? _raw_spin_lock_irqsave+0x130/0x130 [ 262.763128][ T26] do_group_exit+0x141/0x310 [ 262.787270][ T26] ? __kasan_check_write+0x14/0x20 [ 262.792445][ T26] get_signal+0xf7d/0x12e0 [ 262.798968][ T26] ? security_file_permission+0x83/0xa0 [ 262.804549][ T26] arch_do_signal_or_restart+0xe2/0x11d0 [ 262.826302][ T26] ? kernel_read+0x70/0x70 [ 262.830780][ T26] ? KSTK_ESP+0x60/0x60 [ 262.834956][ T26] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 262.856677][ T26] ? __kasan_check_read+0x11/0x20 [ 262.861763][ T26] ? __fdget_pos+0x1f7/0x380 [ 262.886556][ T26] ? vfs_write+0xdc0/0xdc0 [ 262.891038][ T26] exit_to_user_mode_loop+0xa2/0xe0 [ 262.916534][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 262.922053][ T26] syscall_exit_to_user_mode+0x1d/0x40 [ 263.016918][ T26] do_syscall_64+0x3d/0x40 [ 263.021414][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 263.036925][ T26] RIP: 0033:0x7f8db8debf57 [ 263.041398][ T26] RSP: 002b:00007ffdbd488a50 EFLAGS: 00000202 ORIG_RAX: 0000000000000000 [ 263.067221][ T26] RAX: fffffffffffffe00 RBX: 0000555577a14500 RCX: 00007f8db8debf57 [ 263.075269][ T26] RDX: 0000000000000030 RSI: 00007ffdbd488b30 RDI: 00000000000000f9 [ 263.116018][ T26] RBP: 00007ffdbd488adc R08: 0000000000000000 R09: 0000000000000000 [ 263.124056][ T26] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000004b [ 263.206105][ T26] R13: 0000555577a278e0 R14: 000000000001a771 R15: 00007ffdbd488b30 [ 263.226934][ T26] INFO: task syz.1.1137:4217 blocked for more than 132 seconds. [ 263.234616][ T26] Tainted: G W syzkaller #0 [ 263.256190][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 263.264915][ T26] task:syz.1.1137 state:D stack: 0 pid: 4217 ppid: 279 flags:0x00004002 [ 263.297141][ T26] Call Trace: [ 263.358466][ T26] __schedule+0xb53/0x1320 [ 263.362951][ T26] ? __sched_text_start+0x8/0x8 [ 263.455976][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 263.461166][ T26] ? __kasan_check_write+0x14/0x20 [ 263.476119][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 263.481993][ T26] schedule+0x13c/0x1d0 [ 263.497414][ T26] schedule_preempt_disabled+0x13/0x20 [ 263.502944][ T26] __mutex_lock+0x6cc/0xc60 [ 263.526818][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 263.533643][ T26] ? memset+0x35/0x40 [ 263.556974][ T26] __mutex_lock_slowpath+0xe/0x10 [ 263.562097][ T26] mutex_lock+0xdb/0xf0 [ 263.568322][ T26] ? mutex_trylock+0xa0/0xa0 [ 263.572955][ T26] ? security_file_free+0xc7/0xe0 [ 263.757336][ T26] ? tun_chr_open+0x540/0x540 [ 263.762097][ T26] rtnl_lock+0x15/0x20 [ 263.777559][ T26] tun_chr_close+0x40/0x140 [ 263.782120][ T26] __fput+0x2fb/0x770 [ 263.856765][ T26] ____fput+0x15/0x20 [ 263.860916][ T26] task_work_run+0x127/0x190 [ 263.865529][ T26] do_exit+0xa90/0x2500 [ 263.897302][ T26] ? put_task_struct+0x90/0x90 [ 263.902142][ T26] ? __irq_exit_rcu+0x40/0x150 [ 263.909359][ T26] ? __kasan_check_write+0x14/0x20 [ 263.914517][ T26] ? _raw_spin_lock_irq+0x95/0xf0 [ 263.936660][ T26] ? _raw_spin_lock_irqsave+0x130/0x130 [ 263.942272][ T26] do_group_exit+0x141/0x310 [ 263.966232][ T26] ? __kasan_check_write+0x14/0x20 [ 263.971412][ T26] get_signal+0xf7d/0x12e0 [ 263.978746][ T26] arch_do_signal_or_restart+0xe2/0x11d0 [ 263.984481][ T26] ? irqentry_exit+0x56/0x60 [ 264.006294][ T26] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 264.012194][ T26] ? futex_exit_release+0x1d0/0x1d0 [ 264.036226][ T26] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 264.042463][ T26] ? __se_sys_futex+0x110/0x370 [ 264.066371][ T26] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 264.072068][ T26] ? __se_sys_futex+0x2ba/0x370 [ 264.097831][ T26] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 264.103964][ T26] exit_to_user_mode_loop+0xa2/0xe0 [ 264.316433][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 264.321965][ T26] syscall_exit_to_user_mode+0x1d/0x40 [ 264.346490][ T26] do_syscall_64+0x3d/0x40 [ 264.350977][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 264.358929][ T26] RIP: 0033:0x7f41bbd62dd9 [ 264.363383][ T26] RSP: 002b:00007f41ba79c0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 264.386200][ T26] RAX: fffffffffffffe00 RBX: 00007f41bbfdc098 RCX: 00007f41bbd62dd9 [ 264.394231][ T26] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f41bbfdc098 [ 264.427481][ T26] RBP: 00007f41bbfdc090 R08: 0000000000000000 R09: 0000000000000000 [ 264.435522][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 264.476580][ T26] R13: 00007f41bbfdc128 R14: 00007fffbb748850 R15: 00007fffbb748938 [ 264.484632][ T26] INFO: task syz.3.1141:4226 blocked for more than 133 seconds. [ 264.506699][ T26] Tainted: G W syzkaller #0 [ 264.513078][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 264.547105][ T26] task:syz.3.1141 state:D stack: 0 pid: 4226 ppid: 280 flags:0x00004006 [ 264.686826][ T26] Call Trace: [ 264.690276][ T26] __schedule+0xb53/0x1320 [ 264.694710][ T26] ? __sched_text_start+0x8/0x8 [ 264.717847][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 264.723114][ T26] ? __kasan_check_write+0x14/0x20 [ 264.747102][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 264.752966][ T26] schedule+0x13c/0x1d0 [ 264.767056][ T26] schedule_preempt_disabled+0x13/0x20 [ 264.772662][ T26] __mutex_lock+0x6cc/0xc60 [ 264.796864][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 264.803688][ T26] ? memset+0x35/0x40 [ 264.826649][ T26] __mutex_lock_slowpath+0xe/0x10 [ 264.831741][ T26] mutex_lock+0xdb/0xf0 [ 264.838342][ T26] ? mutex_trylock+0xa0/0xa0 [ 264.842963][ T26] ? security_file_free+0xc7/0xe0 [ 264.997389][ T26] ? tun_chr_open+0x540/0x540 [ 265.002137][ T26] rtnl_lock+0x15/0x20 [ 265.026528][ T26] tun_chr_close+0x40/0x140 [ 265.031091][ T26] __fput+0x2fb/0x770 [ 265.035406][ T26] ____fput+0x15/0x20 [ 265.417491][ T26] task_work_run+0x127/0x190 [ 265.422161][ T26] do_exit+0xa90/0x2500 [ 265.447317][ T26] ? put_task_struct+0x90/0x90 [ 265.452154][ T26] ? __kasan_check_write+0x14/0x20 [ 265.470804][ T26] ? _raw_spin_lock_irq+0x95/0xf0 [ 265.475893][ T26] ? _raw_spin_lock_irqsave+0x130/0x130 [ 265.492217][ T26] do_group_exit+0x141/0x310 [ 265.517575][ T26] ? __kasan_check_write+0x14/0x20 [ 265.522756][ T26] get_signal+0xf7d/0x12e0 [ 265.545997][ T26] ? netdev_run_todo+0xce3/0xd50 [ 265.550992][ T26] arch_do_signal_or_restart+0xe2/0x11d0 [ 265.576464][ T26] ? __kasan_check_write+0x14/0x20 [ 265.581639][ T26] ? mutex_unlock+0x1c/0x40 [ 265.588618][ T26] ? ppp_ioctl+0x12db/0x15d0 [ 265.593246][ T26] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 265.616203][ T26] ? ppp_poll+0x260/0x260 [ 265.836435][ T26] ? __fget_files+0x2c4/0x320 [ 265.841189][ T26] ? __kasan_check_write+0x14/0x20 [ 265.866709][ T26] ? fput_many+0x15a/0x1a0 [ 265.871193][ T26] ? fput+0x1a/0x20 [ 265.875023][ T26] exit_to_user_mode_loop+0xa2/0xe0 [ 265.896393][ T26] exit_to_user_mode_prepare+0x76/0xa0 [ 265.902006][ T26] syscall_exit_to_user_mode+0x1d/0x40 [ 265.926576][ T26] do_syscall_64+0x3d/0x40 [ 265.931058][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 265.949049][ T26] RIP: 0033:0x7fb4cb953dd9 [ 265.967384][ T26] RSP: 002b:00007fb4ca36c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 265.975868][ T26] RAX: fffffffffffffff2 RBX: 00007fb4cbbcd180 RCX: 00007fb4cb953dd9 [ 266.127202][ T26] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000004 [ 266.135245][ T26] RBP: 00007fb4cb9e9d69 R08: 0000000000000000 R09: 0000000000000000 [ 266.176685][ T26] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 266.184733][ T26] R13: 00007fb4cbbcd218 R14: 00007fb4cbbcd180 R15: 00007ffd786f2c58 [ 266.217233][ T26] INFO: task syz-executor:4250 blocked for more than 135 seconds. [ 266.225098][ T26] Tainted: G W syzkaller #0 [ 266.256571][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 266.265295][ T26] task:syz-executor state:D stack: 0 pid: 4250 ppid: 1 flags:0x00004004 [ 266.296884][ T26] Call Trace: [ 266.300246][ T26] __schedule+0xb53/0x1320 [ 266.304716][ T26] ? __sched_text_start+0x8/0x8 [ 266.327547][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 266.332730][ T26] ? __kasan_check_write+0x14/0x20 [ 266.356769][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 266.411502][ T26] schedule+0x13c/0x1d0 [ 266.415720][ T26] schedule_preempt_disabled+0x13/0x20 [ 266.437060][ T26] __mutex_lock+0x6cc/0xc60 [ 266.441636][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 266.466016][ T26] ? cap_capable+0x19c/0x220 [ 266.470777][ T26] __mutex_lock_slowpath+0xe/0x10 [ 266.475821][ T26] mutex_lock+0xdb/0xf0 [ 266.496265][ T26] ? mutex_trylock+0xa0/0xa0 [ 266.500913][ T26] ? ns_capable+0x8c/0xf0 [ 266.505268][ T26] ? netlink_net_capable+0x125/0x160 [ 266.647570][ T26] rtnetlink_rcv_msg+0x576/0xcc0 [ 266.652666][ T26] ? rtnetlink_bind+0x80/0x80 [ 266.677630][ T26] ? arch_stack_walk+0xee/0x140 [ 266.682551][ T26] ? stack_trace_save+0xa6/0xf0 [ 266.706250][ T26] ? stack_trace_snprint+0xf0/0xf0 [ 266.711512][ T26] ? avc_has_perm+0x168/0x3d0 [ 266.737032][ T26] ? memcpy+0x56/0x70 [ 266.741079][ T26] ? avc_has_perm+0x27f/0x3d0 [ 266.745774][ T26] ? __kasan_slab_alloc+0xbd/0xf0 [ 267.055957][ C1] net_ratelimit: 57872 callbacks suppressed [ 267.055972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.061632][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 267.062014][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.098079][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.100839][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 267.110261][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.124943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 267.134140][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.151858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 267.158006][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.199246][ T26] ? slab_post_alloc_hook+0x5d/0x2f0 [ 267.204612][ T26] ? avc_has_perm_noaudit+0x260/0x260 [ 267.212018][ T26] ? selinux_nlmsg_lookup+0x3de/0x4a0 [ 267.219486][ T26] netlink_rcv_skb+0x1f5/0x440 [ 267.224378][ T26] ? rtnetlink_bind+0x80/0x80 [ 267.231048][ T26] ? netlink_ack+0xb70/0xb70 [ 267.235670][ T26] ? __netlink_lookup+0x387/0x3b0 [ 267.242674][ T26] rtnetlink_rcv+0x1c/0x20 [ 267.249034][ T26] netlink_unicast+0x876/0xa40 [ 267.253824][ T26] netlink_sendmsg+0x89c/0xb50 [ 267.260587][ T26] ? netlink_getsockopt+0x530/0x530 [ 267.265812][ T26] ? security_socket_sendmsg+0x82/0xa0 [ 267.273271][ T26] __sys_sendto+0x467/0x620 [ 267.279803][ T26] ? __ia32_sys_getpeername+0x90/0x90 [ 267.285207][ T26] ? down_read_trylock+0x106/0x160 [ 267.292300][ T26] ? up_read+0x12/0x50 [ 267.298429][ T26] ? do_user_addr_fault+0x797/0xc90 [ 267.303661][ T26] ? debug_smp_processor_id+0x17/0x20 [ 267.311117][ T26] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 267.319144][ T26] __x64_sys_sendto+0xe5/0x100 [ 267.323943][ T26] do_syscall_64+0x31/0x40 [ 267.330444][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 267.338368][ T26] RIP: 0033:0x7eff52e92f57 [ 267.342808][ T26] RSP: 002b:00007ffe2b6d2a80 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 267.353272][ T26] RAX: ffffffffffffffda RBX: 0000555562cc7500 RCX: 00007eff52e92f57 [ 267.377222][ T26] RDX: 0000000000000028 RSI: 00007eff53c7f670 RDI: 0000000000000003 [ 267.385260][ T26] RBP: 0000000000000001 R08: 00007ffe2b6d2ae4 R09: 000000000000000c [ 267.507732][ T26] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 267.515777][ T26] R13: 0000000000000000 R14: 00007eff53c7f670 R15: 0000000000000000 [ 267.546970][ T26] INFO: task syz-executor:4251 blocked for more than 136 seconds. [ 267.554836][ T26] Tainted: G W syzkaller #0 [ 267.587676][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 267.716435][ T26] task:syz-executor state:D stack: 0 pid: 4251 ppid: 1 flags:0x00004004 [ 267.725711][ T26] Call Trace: [ 267.757246][ T26] __schedule+0xb53/0x1320 [ 267.761723][ T26] ? __sched_text_start+0x8/0x8 [ 267.776357][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 267.781544][ T26] ? __kasan_check_write+0x14/0x20 [ 267.836737][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 267.842619][ T26] schedule+0x13c/0x1d0 [ 268.027837][ T26] schedule_preempt_disabled+0x13/0x20 [ 268.033379][ T26] __mutex_lock+0x6cc/0xc60 [ 268.067788][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 268.074625][ T26] ? __kasan_check_write+0x14/0x20 [ 268.096732][ T26] ? _raw_spin_lock+0x94/0xf0 [ 268.101471][ T26] ? cap_capable+0x19c/0x220 [ 268.126082][ T26] __mutex_lock_slowpath+0xe/0x10 [ 268.131259][ T26] mutex_lock+0xdb/0xf0 [ 268.135436][ T26] ? mutex_trylock+0xa0/0xa0 [ 268.157158][ T26] ? ns_capable+0x8c/0xf0 [ 268.161554][ T26] ? netlink_net_capable+0x125/0x160 [ 268.406991][ T26] rtnetlink_rcv_msg+0x576/0xcc0 [ 268.412006][ T26] ? rtnetlink_bind+0x80/0x80 [ 268.457432][ T26] ? qlink_free+0x3e/0x90 [ 268.461823][ T26] ? ___cache_free+0x10e/0x130 [ 268.468645][ T26] ? qlink_free+0x50/0x90 [ 268.473012][ T26] ? qlist_free_all+0x5f/0xb0 [ 268.607646][ T26] ? avc_has_perm+0x168/0x3d0 [ 268.612491][ T26] ? memcpy+0x56/0x70 [ 268.637238][ T26] ? avc_has_perm+0x27f/0x3d0 [ 268.641979][ T26] ? __kasan_slab_alloc+0xbd/0xf0 [ 268.649410][ T26] ? slab_post_alloc_hook+0x5d/0x2f0 [ 268.654737][ T26] ? avc_has_perm_noaudit+0x260/0x260 [ 268.677179][ T26] ? selinux_nlmsg_lookup+0x3de/0x4a0 [ 268.682617][ T26] netlink_rcv_skb+0x1f5/0x440 [ 268.796986][ T26] ? rtnetlink_bind+0x80/0x80 [ 268.801924][ T26] ? netlink_ack+0xb70/0xb70 [ 268.826293][ T26] ? __netlink_lookup+0x387/0x3b0 [ 268.831468][ T26] rtnetlink_rcv+0x1c/0x20 [ 268.835904][ T26] netlink_unicast+0x876/0xa40 [ 268.842754][ T26] netlink_sendmsg+0x89c/0xb50 [ 268.866523][ T26] ? netlink_getsockopt+0x530/0x530 [ 268.871790][ T26] ? security_socket_sendmsg+0x82/0xa0 [ 268.889351][ T26] __sys_sendto+0x467/0x620 [ 268.894015][ T26] ? __ia32_sys_getpeername+0x90/0x90 [ 268.987055][ T26] ? down_read_trylock+0x106/0x160 [ 268.992325][ T26] ? up_read+0x12/0x50 [ 269.017379][ T26] ? do_user_addr_fault+0x797/0xc90 [ 269.022641][ T26] ? debug_smp_processor_id+0x17/0x20 [ 269.046890][ T26] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 269.053018][ T26] __x64_sys_sendto+0xe5/0x100 [ 269.061146][ T26] do_syscall_64+0x31/0x40 [ 269.065603][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 269.086606][ T26] RIP: 0033:0x7f659ec41f57 [ 269.091084][ T26] RSP: 002b:00007ffd07620220 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 269.116459][ T26] RAX: ffffffffffffffda RBX: 0000555589dc0500 RCX: 00007f659ec41f57 [ 269.124490][ T26] RDX: 0000000000000028 RSI: 00007f659fa2e670 RDI: 0000000000000003 [ 269.267468][ T26] RBP: 0000000000000001 R08: 00007ffd07620284 R09: 000000000000000c [ 269.275499][ T26] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 269.317060][ T26] R13: 0000000000000000 R14: 00007f659fa2e670 R15: 0000000000000000 [ 269.325107][ T26] INFO: task syz-executor:4252 blocked for more than 138 seconds. [ 269.347289][ T26] Tainted: G W syzkaller #0 [ 269.353702][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 269.447130][ T26] task:syz-executor state:D stack: 0 pid: 4252 ppid: 1 flags:0x00004004 [ 269.476053][ T26] Call Trace: [ 269.479409][ T26] __schedule+0xb53/0x1320 [ 269.483893][ T26] ? __sched_text_start+0x8/0x8 [ 269.507684][ T26] ? __mutex_add_waiter+0xcc/0x280 [ 269.512857][ T26] ? __kasan_check_write+0x14/0x20 [ 269.676090][ T26] ? atomic_dec_and_mutex_lock+0x1a0/0x1a0 [ 269.682065][ T26] schedule+0x13c/0x1d0 [ 269.707154][ T26] schedule_preempt_disabled+0x13/0x20 [ 269.712703][ T26] __mutex_lock+0x6cc/0xc60 [ 269.719243][ T26] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 269.737295][ T26] ? cap_capable+0x19c/0x220 [ 269.741959][ T26] __mutex_lock_slowpath+0xe/0x10 [ 269.756743][ T26] mutex_lock+0xdb/0xf0 [ 269.760955][ T26] ? mutex_trylock+0xa0/0xa0 [ 269.765564][ T26] ? ns_capable+0x8c/0xf0 [ 269.796628][ T26] ? netlink_net_capable+0x125/0x160 [ 269.934042][ T26] rtnetlink_rcv_msg+0x576/0xcc0 [ 269.956149][ T26] ? rtnetlink_bind+0x80/0x80 [ 269.960890][ T26] ? arch_stack_walk+0xee/0x140 [ 269.965786][ T26] ? stack_trace_save+0xa6/0xf0 [ 269.987107][ T26] ? stack_trace_snprint+0xf0/0xf0 [ 269.992289][ T26] ? avc_has_perm+0x168/0x3d0 [ 270.017690][ T26] ? memcpy+0x56/0x70 [ 270.021738][ T26] ? avc_has_perm+0x27f/0x3d0 [ 270.046190][ T26] ? __kasan_slab_alloc+0xbd/0xf0 [ 270.051270][ T26] ? slab_post_alloc_hook+0x5d/0x2f0 [ 270.058906][ T26] ? avc_has_perm_noaudit+0x260/0x260 [ 270.064323][ T26] ? selinux_nlmsg_lookup+0x3de/0x4a0 [ 270.176735][ T26] netlink_rcv_skb+0x1f5/0x440 [ 270.181652][ T26] ? rtnetlink_bind+0x80/0x80 [ 270.206933][ T26] ? netlink_ack+0xb70/0xb70 [ 270.211674][ T26] ? __netlink_lookup+0x387/0x3b0 [ 270.220416][ T26] rtnetlink_rcv+0x1c/0x20 [ 270.224897][ T26] netlink_unicast+0x876/0xa40 [ 270.247210][ T26] netlink_sendmsg+0x89c/0xb50 [ 270.252033][ T26] ? netlink_getsockopt+0x530/0x530 [ 270.317308][ T26] ? security_socket_sendmsg+0x82/0xa0 [ 270.322826][ T26] __sys_sendto+0x467/0x620 [ 270.347457][ T26] ? __ia32_sys_getpeername+0x90/0x90 [ 270.358350][ T26] ? down_read_trylock+0x106/0x160 [ 270.363513][ T26] ? up_read+0x12/0x50 [ 270.416819][ T26] ? do_user_addr_fault+0x797/0xc90 [ 270.422117][ T26] ? debug_smp_processor_id+0x17/0x20 [ 270.446018][ T26] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 270.452156][ T26] __x64_sys_sendto+0xe5/0x100 [ 270.476387][ T26] do_syscall_64+0x31/0x40 [ 270.480872][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 270.506286][ T26] RIP: 0033:0x7f1e93598f57 [ 270.510765][ T26] RSP: 002b:00007ffcfc02bef0 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 270.536732][ T26] RAX: ffffffffffffffda RBX: 000055556c2fc500 RCX: 00007f1e93598f57 [ 270.544767][ T26] RDX: 0000000000000028 RSI: 00007f1e94385670 RDI: 0000000000000003 [ 270.678174][ T26] RBP: 0000000000000001 R08: 00007ffcfc02bf54 R09: 000000000000000c [ 270.706566][ T26] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 270.714598][ T26] R13: 0000000000000000 R14: 00007f1e94385670 R15: 0000000000000000 [ 270.747015][ T26] NMI backtrace for cpu 0 [ 270.751410][ T26] CPU: 0 PID: 26 Comm: khungtaskd Tainted: G W syzkaller #0 [ 270.760014][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 270.770080][ T26] Call Trace: [ 270.773398][ T26] __dump_stack+0x21/0x24 [ 270.777748][ T26] dump_stack_lvl+0x1a7/0x208 [ 270.782560][ T26] ? show_regs_print_info+0x18/0x18 [ 270.787801][ T26] ? sched_show_task+0x31c/0x480 [ 270.792761][ T26] ? __rcu_read_unlock+0xa0/0xa0 [ 270.797719][ T26] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 270.803923][ T26] dump_stack+0x15/0x1c [ 270.808107][ T26] nmi_trigger_cpumask_backtrace+0x27f/0x2c0 [ 270.814103][ T26] arch_trigger_cpumask_backtrace+0x10/0x20 [ 270.820008][ T26] watchdog+0xe2d/0xf80 [ 270.824183][ T26] ? hungtask_pm_notify+0x50/0x50 [ 270.829224][ T26] ? __kasan_check_read+0x11/0x20 [ 270.834266][ T26] ? __kthread_parkme+0xb9/0x1c0 [ 270.839245][ T26] kthread+0x346/0x3d0 [ 270.843330][ T26] ? hungtask_pm_notify+0x50/0x50 [ 270.848368][ T26] ? kthread_blkcg+0xd0/0xd0 [ 270.852986][ T26] ret_from_fork+0x1f/0x30 [ 270.859586][ T26] Sending NMI from CPU 0 to CPUs 1: [ 270.865969][ C1] NMI backtrace for cpu 1 [ 270.865978][ C1] CPU: 1 PID: 4188 Comm: syz.0.1130 Tainted: G W syzkaller #0 [ 270.865986][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 270.865997][ C1] RIP: 0010:__sysvec_apic_timer_interrupt+0x2e/0x3f0 [ 270.866013][ C1] Code: 41 57 41 56 41 55 41 54 53 48 89 fb 49 bd 00 00 00 00 00 fc ff df 48 c7 c7 c0 81 e6 84 e8 9a 9a 50 03 65 4c 8b 25 0a 40 d8 7e <48> c7 c7 a0 81 e6 84 e8 86 9a 50 03 65 48 89 1d f6 3f d8 7e 48 c7 [ 270.866018][ C1] RSP: 0018:ffffc90000170c38 EFLAGS: 00000082 [ 270.866029][ C1] RAX: 0000000000000001 RBX: ffffc90000170c98 RCX: ffb60cbba53c1500 [ 270.866036][ C1] RDX: 1ffffffff0dcf408 RSI: ffffffff84e681c0 RDI: ffffffff854082a0 [ 270.866043][ C1] RBP: ffffc90000170c60 R08: ffffffff86e7a048 R09: ffffffff86e7a058 [ 270.866050][ C1] R10: ffffffff86e7a05c R11: ffffffff86e7a043 R12: 0000000000000000 [ 270.866057][ C1] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 270.866064][ C1] FS: 00007f1aca1356c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 270.866070][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.866077][ C1] CR2: 00007f26844ca83a CR3: 000000010ad3e000 CR4: 00000000003506a0 [ 270.866083][ C1] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 270.866090][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 270.866093][ C1] Call Trace: [ 270.866095][ C1] [ 270.866100][ C1] sysvec_apic_timer_interrupt+0xba/0xe0 [ 270.866105][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 270.866109][ C1] RIP: 0010:memset_erms+0xb/0x10 [ 270.866125][ C1] Code: 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 f3 aa <4c> 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 01 01 [ 270.866130][ C1] RSP: 0018:ffffc90000170d40 EFLAGS: 00000202 [ 270.866140][ C1] RAX: 1ffff1102b428500 RBX: 0000000000000010 RCX: 0000000000000000 [ 270.866146][ C1] RDX: 0000000000000010 RSI: 0000000000000000 RDI: ffff88815a142dd0 [ 270.866153][ C1] RBP: ffffc90000170d60 R08: ffff88815a142dcf R09: ffff88815a142dc0 [ 270.866160][ C1] R10: dffffc0000000000 R11: ffffed102b4285ba R12: ffff88815a142148 [ 270.866167][ C1] R13: ffff8881f71576d0 R14: 0000000000000000 R15: ffff88815a142dc0 [ 270.866170][ C1] ? memset+0x35/0x40 [ 270.866175][ C1] process_backlog+0x314/0x600 [ 270.866179][ C1] net_rx_action+0x44d/0xe00 [ 270.866183][ C1] ? __irq_exit_rcu+0x40/0x150 [ 270.866188][ C1] ? net_tx_action+0x530/0x530 [ 270.866192][ C1] __do_softirq+0x255/0x563 [ 270.866196][ C1] asm_call_irq_on_stack+0xf/0x20 [ 270.866199][ C1] [ 270.866203][ C1] do_softirq_own_stack+0x60/0x80 [ 270.866208][ C1] __irq_exit_rcu+0x128/0x150 [ 270.866212][ C1] irq_exit_rcu+0x9/0x10 [ 270.866217][ C1] sysvec_apic_timer_interrupt+0xbf/0xe0 [ 270.866222][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 270.866226][ C1] RIP: 0010:__slab_free+0xc1/0x3a0 [ 270.866242][ C1] Code: 7e 20 4d 39 f8 0f 84 76 02 00 00 8b 47 28 4a 8d 0c 00 48 0f c9 4c 8b 6e 28 48 8b 97 d8 00 00 00 4c 31 fa 48 31 ca 4a 89 14 00 <44> 89 e8 2b 45 b4 0f b7 c0 45 89 ee 41 81 e6 00 00 ff ff 41 09 c6 [ 270.866247][ C1] RSP: 0018:ffffc90002556c38 EFLAGS: 00000206 [ 270.866256][ C1] RAX: 0000000000000078 RBX: ffff888142bc6a00 RCX: 786abc428188ffff [ 270.866263][ C1] RDX: 0a3a2c04cf07f678 RSI: ffffea00050af180 RDI: ffff888107d92c00 [ 270.866269][ C1] RBP: ffffc90002556cb8 R08: ffff888142bc6a00 R09: 0000000000000000 [ 270.866276][ C1] R10: dffffc0000000000 R11: fffff520004aad98 R12: ffffea00050af180 [ 270.866283][ C1] R13: 00000000800c0001 R14: ffffffff819f485e R15: ffff888142bc6140 [ 270.866287][ C1] ? qlink_free+0x3e/0x90 [ 270.866291][ C1] ? __slab_free+0x2c9/0x3a0 [ 270.866295][ C1] ? irq_exit_rcu+0x9/0x10 [ 270.866301][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 270.866305][ C1] ? qlink_free+0x3e/0x90 [ 270.866309][ C1] ___cache_free+0x10e/0x130 [ 270.866313][ C1] qlink_free+0x50/0x90 [ 270.866317][ C1] qlist_free_all+0x5f/0xb0 [ 270.866322][ C1] kasan_quarantine_reduce+0x14a/0x160 [ 270.866326][ C1] __kasan_slab_alloc+0x2f/0xf0 [ 270.866330][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 270.866334][ C1] ? sched_clock+0x3a/0x40 [ 270.866339][ C1] ? sched_clock_cpu+0x1b/0x3d0 [ 270.866343][ C1] ? sched_clock+0x3a/0x40 [ 270.866347][ C1] ? sched_clock_cpu+0x1b/0x3d0 [ 270.866351][ C1] ? __irq_exit_rcu+0x40/0x150 [ 270.866355][ C1] ? irq_exit_rcu+0x9/0x10 [ 270.866361][ C1] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 270.866366][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 270.866370][ C1] slab_post_alloc_hook+0x5d/0x2f0 [ 270.866375][ C1] ? __kernfs_new_node+0xe3/0x6b0 [ 270.866379][ C1] ? __kernfs_new_node+0xe3/0x6b0 [ 270.866383][ C1] kmem_cache_alloc+0x162/0x2d0 [ 270.866388][ C1] ? __kernfs_new_node+0xe3/0x6b0 [ 270.866392][ C1] __kernfs_new_node+0xe3/0x6b0 [ 270.866397][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 270.866401][ C1] ? sched_clock_cpu+0x1b/0x3d0 [ 270.866405][ C1] ? kernfs_new_node+0x260/0x260 [ 270.866410][ C1] ? __irq_exit_rcu+0x40/0x150 [ 270.866414][ C1] ? irq_exit_rcu+0x9/0x10 [ 270.866418][ C1] kernfs_new_node+0x150/0x260 [ 270.866423][ C1] kernfs_create_dir_ns+0x47/0x130 [ 270.866427][ C1] sysfs_create_dir_ns+0x128/0x290 [ 270.866433][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 270.866437][ C1] ? sysfs_warn_dup+0xa0/0xa0 [ 270.866442][ C1] kobject_add_internal+0x6cd/0xcc0 [ 270.866446][ C1] kobject_add+0x162/0x230 [ 270.866450][ C1] ? _raw_spin_lock+0x94/0xf0 [ 270.866454][ C1] ? kobject_init+0x1d0/0x1d0 [ 270.866459][ C1] ? __kasan_check_write+0x14/0x20 [ 270.866463][ C1] ? mutex_unlock+0x1c/0x40 [ 270.866467][ C1] ? get_device_parent+0x2a1/0x410 [ 270.866471][ C1] device_add+0x3e7/0xc10 [ 270.866476][ C1] netdev_register_kobject+0x1bc/0x360 [ 270.866481][ C1] register_netdevice+0xdf0/0x13e0 [ 270.866486][ C1] ? netif_stacked_transfer_operstate+0x220/0x220 [ 270.866490][ C1] __ip_tunnel_create+0x2c7/0x390 [ 270.866495][ C1] ? ip_tunnel_init_net+0x730/0x730 [ 270.866500][ C1] ip_tunnel_init_net+0x2be/0x730 [ 270.866504][ C1] ? ip_tunnel_get_iflink+0x50/0x50 [ 270.866508][ C1] ? __kmalloc+0x1a4/0x330 [ 270.866513][ C1] ipgre_tap_init_net+0x29/0x30 [ 270.866517][ C1] ops_init+0x1ba/0x4a0 [ 270.866520][ C1] setup_net+0x376/0xb60 [ 270.866525][ C1] ? copy_net_ns+0x520/0x520 [ 270.866529][ C1] ? __kasan_check_write+0x14/0x20 [ 270.866533][ C1] copy_net_ns+0x314/0x520 [ 270.866538][ C1] create_new_namespaces+0x3a2/0x650 [ 270.866542][ C1] copy_namespaces+0x1d1/0x220 [ 270.866546][ C1] ? copy_signal+0x4cb/0x600 [ 270.866550][ C1] copy_process+0x11d3/0x3300 [ 270.866555][ C1] ? __pidfd_prepare+0x150/0x150 [ 270.866559][ C1] kernel_clone+0x233/0x960 [ 270.866563][ C1] ? create_io_thread+0x170/0x170 [ 270.866568][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 270.866572][ C1] ? sched_clock+0x3a/0x40 [ 270.866576][ C1] ? sched_clock_cpu+0x1b/0x3d0 [ 270.866581][ C1] __x64_sys_clone+0x198/0x210 [ 270.866585][ C1] ? __ia32_sys_vfork+0x130/0x130 [ 270.866590][ C1] ? switch_fpu_return+0x19c/0x330 [ 270.866594][ C1] ? __kasan_check_read+0x11/0x20 [ 270.866599][ C1] ? exit_to_user_mode_prepare+0x9a/0xa0 [ 270.866603][ C1] do_syscall_64+0x31/0x40 [ 270.866608][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 270.866612][ C1] RIP: 0033:0x7f1acb6dadd9 [ 270.866627][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 270.866633][ C1] RSP: 002b:00007f1aca134fd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 270.866644][ C1] RAX: ffffffffffffffda RBX: 00007f1acb953fa0 RCX: 00007f1acb6dadd9 [ 270.866651][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c0126080 [ 270.866657][ C1] RBP: 00007f1acb770d69 R08: 0000000000000000 R09: 0000000000000000 [ 270.866664][ C1] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 270.866671][ C1] R13: 00007f1acb954038 R14: 00007f1acb953fa0 R15: 00007fff54cf2948 [ 272.065931][ C1] net_ratelimit: 50521 callbacks suppressed [ 272.065956][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.072483][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 272.084067][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.107873][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.119868][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.120314][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 272.131973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.152911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 272.156059][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.170147][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 277.075929][ C1] net_ratelimit: 85954 callbacks suppressed [ 277.075943][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 277.077317][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 277.082024][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 277.109092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 277.118612][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 277.141821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 277.149336][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 277.153947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 277.176593][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 277.177876][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 278.679439][ T24] audit: type=1400 audit(1778085103.510:150): avc: denied { read } for pid=4276 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 187) OK Stopping crond: stopped /usr/sbin/crond (pid 179) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 133) [ 281.568731][ T24] audit: type=1400 audit(1778085106.400:151): avc: denied { search } for pid=4288 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 282.085969][ C1] net_ratelimit: 64678 callbacks suppressed [ 282.085985][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 282.096610][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 282.104110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 282.118051][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 282.132373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 282.143050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 282.151809][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 282.175676][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 282.175982][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 282.187731][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 287.095973][ C0] net_ratelimit: 72544 callbacks suppressed [ 287.095989][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 287.097539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 287.102178][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 287.119661][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 287.125943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 287.126533][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 287.140733][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 287.150862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 287.168004][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 287.174120][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 292.105958][ C1] net_ratelimit: 77461 callbacks suppressed [ 292.105972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.107623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 292.112099][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.135124][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 292.136129][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.151999][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 292.159846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.180573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 292.183799][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.210653][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 297.115947][ C1] net_ratelimit: 76075 callbacks suppressed [ 297.115961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.123850][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 297.134115][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.150024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 297.157863][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.173467][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 297.181787][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.199799][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 297.205845][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.223987][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 302.125933][ C1] net_ratelimit: 84040 callbacks suppressed [ 302.125947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.127805][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 302.132099][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.150734][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 302.156058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.173625][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:3c:27:e0:28:95, vlan:0) [ 302.180084][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.215872][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.219044][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:74:00:00:00:00:00, vlan:0) [ 302.227989][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) serialport: VM disconnected.