last executing test programs: 2m45.632861481s ago: executing program 1 (id=3684): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=@base={0x9, 0x18, 0x8, 0x40, 0x42, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r1, &(0x7f0000000580), &(0x7f0000001580)=""/92}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m45.204100722s ago: executing program 1 (id=3687): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000b1698898ca0000000000000000000000000000000000000000d4769eb80aa0dd5937e05eca000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70300001a930000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf0}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd}, {0x85, 0x0, 0x0, 0x2d}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000e7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xa}, 0xa100, 0xc8, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38f0ff10"], 0x0, 0x42, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000c9"], 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007d00000095"], 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r10) 2m44.536285305s ago: executing program 1 (id=3690): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="05000000070000007f0000000900000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00__'], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000009"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000800)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000ec0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/194, 0xc2}, {&(0x7f0000000240)=""/171, 0xab}, {&(0x7f0000000300)=""/63, 0x3f}, {&(0x7f0000000340)=""/34, 0x22}, {&(0x7f0000000380)=""/4, 0x4}, {&(0x7f00000003c0)=""/120, 0x78}, {&(0x7f0000000500)=""/140, 0x8c}, {&(0x7f00000005c0)=""/131, 0x83}, {&(0x7f0000000680)=""/134, 0x86}], 0xa, &(0x7f0000000440)=""/85, 0x55}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0x1, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000cc0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000d00)='blkio.bfq.io_merged\x00', 0x0, 0x0) close(r2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r4, &(0x7f0000000d40), 0x0}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000140), 0x2, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000180)=r8, 0x12) sendmsg$unix(r5, &(0x7f0000000c80)={&(0x7f0000000980)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000a00)="5edbbf93dbb05475d9b6d730aa2e28e780d7c9ca451939d735039c5c555659b2d5fcb964d111fa05fa693eb031a7000ac8bc3633bbe42cf1e8e4b92983b784dbd782e47ebc60de3310b5c02828de00ca5fbaf6e5926c6ceddcf94a46752ebb787a98814ca6e3e08e431905bb77b59486d768cd31bfa4963f34fca0563901a7165916ce9e8f4fb20e1e243b0a693df3f5f668eb0d8b32f2bce96cc6a04853f13e0495", 0xa2}, {&(0x7f0000000ac0)="55ac02911ddb2f75137dd40a304127399e166300c6ee6dc77dfc207343bcbe491c40944f4268eecdf1f34e000f20b8dcab1b157f3cf1", 0x36}, {&(0x7f0000000b00)="398bb6e9a772a10cb80f79d086de22", 0xf}, {&(0x7f0000000b40)="9e321f1a931a9ebcae016249a1f6f405bd6348fb37e5e306adf2d1e418d4f0f093f13d71e7d8bdf58f2b8e8f3b03747bad2663ee799b9b383169d3975f44192e803052dc1a635b6776b8af8c6d6df06b0d108fc10504408f9b4c7db2ca2cc83b59ae774aff24a3f8eae6da44d9e5b7a5389d3b071756b1297d865b5574ec73a2705be2383897a6b4", 0x88}], 0x4, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r8, 0xee00, 0xffffffffffffffff}}}], 0x20, 0x4004044}, 0x4041) socketpair(0x6, 0x1, 0x44, &(0x7f0000000900)) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="05000000070000007f0000000900000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00__'], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000009"], 0x48) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) recvmsg(r1, &(0x7f0000000800)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000ec0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/194, 0xc2}, {&(0x7f0000000240)=""/171, 0xab}, {&(0x7f0000000300)=""/63, 0x3f}, {&(0x7f0000000340)=""/34, 0x22}, {&(0x7f0000000380)=""/4, 0x4}, {&(0x7f00000003c0)=""/120, 0x78}, {&(0x7f0000000500)=""/140, 0x8c}, {&(0x7f00000005c0)=""/131, 0x83}, {&(0x7f0000000680)=""/134, 0x86}], 0xa, &(0x7f0000000440)=""/85, 0x55}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0x1, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000cc0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r3, &(0x7f0000000d00)='blkio.bfq.io_merged\x00', 0x0, 0x0) (async) close(r2) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r2}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r4, &(0x7f0000000d40), 0x0}, 0x20) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_freezer_state(r6, &(0x7f0000000140), 0x2, 0x0) (async) openat$cgroup_procs(r6, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$cgroup_pid(r7, &(0x7f0000000180)=r8, 0x12) (async) sendmsg$unix(r5, &(0x7f0000000c80)={&(0x7f0000000980)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000a00)="5edbbf93dbb05475d9b6d730aa2e28e780d7c9ca451939d735039c5c555659b2d5fcb964d111fa05fa693eb031a7000ac8bc3633bbe42cf1e8e4b92983b784dbd782e47ebc60de3310b5c02828de00ca5fbaf6e5926c6ceddcf94a46752ebb787a98814ca6e3e08e431905bb77b59486d768cd31bfa4963f34fca0563901a7165916ce9e8f4fb20e1e243b0a693df3f5f668eb0d8b32f2bce96cc6a04853f13e0495", 0xa2}, {&(0x7f0000000ac0)="55ac02911ddb2f75137dd40a304127399e166300c6ee6dc77dfc207343bcbe491c40944f4268eecdf1f34e000f20b8dcab1b157f3cf1", 0x36}, {&(0x7f0000000b00)="398bb6e9a772a10cb80f79d086de22", 0xf}, {&(0x7f0000000b40)="9e321f1a931a9ebcae016249a1f6f405bd6348fb37e5e306adf2d1e418d4f0f093f13d71e7d8bdf58f2b8e8f3b03747bad2663ee799b9b383169d3975f44192e803052dc1a635b6776b8af8c6d6df06b0d108fc10504408f9b4c7db2ca2cc83b59ae774aff24a3f8eae6da44d9e5b7a5389d3b071756b1297d865b5574ec73a2705be2383897a6b4", 0x88}], 0x4, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r8, 0xee00, 0xffffffffffffffff}}}], 0x20, 0x4004044}, 0x4041) (async) socketpair(0x6, 0x1, 0x44, &(0x7f0000000900)) (async) 2m44.243533419s ago: executing program 1 (id=3693): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0xf}, @map_val={0x18, 0x2, 0x2, 0x0, r0}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) 2m43.743754594s ago: executing program 1 (id=3697): perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x6, 0x5, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r4) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) ioctl$SIOCSIFHWADDR(r4, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="374292e7f7ef"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41000}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x63, 0x2, 0x4, 0x0, 0x0, 0x0, 0x35a05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={&(0x7f0000000180), 0x9}, 0x1075, 0x7, 0x0, 0x9, 0xffffffffffffbbfe, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x6, 0x5, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) close(r4) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="374292e7f7ef"}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41000}, 0x94) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x63, 0x2, 0x4, 0x0, 0x0, 0x0, 0x35a05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={&(0x7f0000000180), 0x9}, 0x1075, 0x7, 0x0, 0x9, 0xffffffffffffbbfe, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) (async) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) 2m43.167916622s ago: executing program 1 (id=3700): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0x3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) (async) r6 = openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000c40), 0x12) (async) write$cgroup_pid(r8, &(0x7f0000000c40), 0x12) write$cgroup_pid(r6, &(0x7f0000000480), 0x12) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32, @ANYBLOB="0000000000000000b7030000000000008500000087000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r9, 0x0, 0xe, 0x0, &(0x7f0000000340)="c1dfb080cd21d308098ee688b5c6", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 2m28.195744608s ago: executing program 32 (id=3700): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0x3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) (async) r6 = openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000c40), 0x12) (async) write$cgroup_pid(r8, &(0x7f0000000c40), 0x12) write$cgroup_pid(r6, &(0x7f0000000480), 0x12) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32, @ANYBLOB="0000000000000000b7030000000000008500000087000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r9, 0x0, 0xe, 0x0, &(0x7f0000000340)="c1dfb080cd21d308098ee688b5c6", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081130000bfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071107a00000000001d300500000000004704000001ed00000f030000000000001d44020000000000620a00fe040400007203000000000000b500f7ff000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a8641aa05a1336b3b4c4becea710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3380d28e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51bf900000000000000d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343cccc953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93020000000000000080e69db384ac7eeedcf2ba3a9508f9d6aba582a896a9f1e096df6ecea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b583cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6032399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00000000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c9102"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 12.635508979s ago: executing program 4 (id=4928): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x4001000, 0x0, 0x408, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x81, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f00000002c0)={&(0x7f0000000280)=""/15, 0xf, 0x0, &(0x7f0000001380)=""/227, 0xe3}}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xb94}, 0x2060, 0x2000000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=ANY=[], 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={0xffffffffffffffff, r5}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r7 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x4, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x0, 0x0, &(0x7f0000001080)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x10) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000180)={0x0, 0x0}) syz_clone(0x2100000, &(0x7f0000000080)="fe6f697ddca261961cbc51e7d4f8daa757c26fe248b976df8e11be551f4aad124e6d5e01c812f38028ab66bb71df29b908f0bb72a9a18d60b172aa8203233b2ce97127229fb6f47d85c9039253cc2e5beee857758d2bb93447a7e7c17277c358755f303f76c06e654bf3ea9d249f46e91a55cedddb0f7f32f1cf3c76673f6f315a957cbc05ed10e39a811efe427b16a2a551b5ef6589206c048e91469250fa6de703134842f879a3a6e37c05eb71d62280b4fe4b5c430a120cdf4c3eded3b336548361d14cbb", 0xc6, 0x0, &(0x7f0000000200), &(0x7f0000000380)="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") 12.411304761s ago: executing program 4 (id=4929): socketpair$unix(0xa, 0x2, 0x11, &(0x7f00000002c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x1100) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x9, &(0x7f0000001300)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x4, 0xfd, 0x0, 0x0, 0x98629, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010000, 0x1, @perf_config_ext={0x9, 0x80000000000}, 0x800, 0x0, 0x20, 0x0, 0x0, 0x0, 0x80, 0x0, 0x2ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 6.850956874s ago: executing program 5 (id=4942): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000072000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000072000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70300001a930000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.489992611s ago: executing program 4 (id=4946): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{0x1, 0xffffffffffffffff}, &(0x7f0000000a80), &(0x7f0000000ac0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1b, 0x18, &(0x7f0000000140)=@raw=[@ldst={0x1, 0x0, 0x0, 0x5, 0x5, 0x0, 0x1853eafae1b83c64}, @generic={0x5, 0x3, 0x0, 0x9, 0xd856}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x23d}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0x2, 0x9, 0x4, 0xfffffffffffffff0, 0xfffffffffffffffc}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80}}], &(0x7f0000000040)='syzkaller\x00', 0x7ff, 0x4c, &(0x7f0000000200)=""/76, 0x41000, 0x34, '\x00', 0x0, @fallback=0x65e7ed91fbf55c9, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x8, 0x0, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[0x1, r0, 0x1, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0xd}, 0x94) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x6}, 0xc) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={@map=r2, r1, 0x4, 0x2018}, 0x20) bpf$LINK_DETACH(0x22, &(0x7f0000000640), 0x4) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x4, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x7}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="060000"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711834000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000007c0)=0xffffffffffffffff, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000800)={r8}, 0x8) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001a00)={r7, 0x1}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8, r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r11, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r12, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x8cff, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000006c0)=@o_path={&(0x7f0000000680)='./file0\x00', r2, 0x4000, r10}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000006d0ae6c3000000000000"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a40)={{r2, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000a00)='%pK \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@map_fd={0x18, 0x2, 0x1, 0x0, r13}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r10) 4.403306864s ago: executing program 5 (id=4958): r0 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)='W', 0x1}], 0x1}, 0x0) close(r1) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_clone(0x100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNGETVNETLE(r1, 0xc008744c, &(0x7f0000000180)) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x4}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$unix(r4, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='cpu\t&0\t\t\t') (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0xb8}, [@ldst={0x5, 0x2}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 4.26802006s ago: executing program 5 (id=4960): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000200)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r6 = perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xffeffffbfff7ffde, 0xffffffffffffffff, 0x9) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x19, &(0x7f0000000000)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9d9}}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xf}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6f1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000100)='GPL\x00', 0x101, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0x9, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r7, r7], 0x0, 0x10, 0x4}, 0x94) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYRES64=r8, @ANYRES32=r7, @ANYBLOB="0000000000000000b70300001a930000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="060000000200000002000000000000000f020000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r10, 0x58, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x1, 0x9, 0xd, 0x1080, r11, 0x1, '\x00', r12, 0xffffffffffffffff, 0x3, 0x3, 0x4, 0x7}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x9, 0xd1, 0xaf1, 0x102, 0xffffffffffffffff, 0x6, '\x00', r12, 0xffffffffffffffff, 0x4, 0x2, 0x2, 0xc}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=ANY=[@ANYBLOB="0b00000005000000070100000900000001"], 0x50) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r14}, 0xc) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007d00000095"], 0x0}, 0x94) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r15) 4.08106259s ago: executing program 0 (id=4961): r0 = syz_clone(0x100000, &(0x7f0000000000)="bc820fe5766243304326bec7d5f488486749aa74cf3ad8c5de9af8bc3216ca5f9dd6ab509348e5312bce862c3da9908bc2a25eafc7de9746692f856a8eb0e58e93731933b09b1d5ebc3aeb89ea44266a6cd4f5c4a4373d96a1849f40914a66c127151f6d94f3e22a47daa5f4519ad8d6959b1d222823d55ebeb8bf4edd4b23262e10811d2e728d80beacb12966da1842472cb1dbd23aa64bfdd4cd5ba340ca4bda59720b3b29735c06c9761438ac0d14be8cf809", 0xb4, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b9f1e7f6615e397fad19ec212ef8444a073f7dc8cfc85254eaa4f0c47a018e6001b1560139c9a9495ceabcb448ca19d636cf8524d52715e3f1e6bea5a6b9484c4b2549c115bc2adef4e635ab416f5bdad8f977963b8018b6fdfe88d3cfea2d72bf86cd1b332c836a17d0e2b3820308db9b3953eb8b01b158ca8e79f6cda402b4bc2e283a3930d3cc0102037a897ab9a31278023f0d18e6925922c9cadd4f1f6a035fd06ff4ab186cfe8fbd8746d171c0c312368960673af1e88fc2b51ce631051aefa7b6842d63d701db677637871076d7262b41b059c1238d88618a0f532f9c71fd86fabfc21a5f0dd49946e2ae1ce730fd36a7d6f8e7af2e514b04cfb0a796e9524116ea685a2a289a9feef5e8d701e226f34ecd9c45b2ff2c28e4f4856e20265b186dfe7f8cb2b352d439ed325135c593170adc8290f541b633c1630e3779b35cd007aa0d21878cbeb35736e1f3cfc500dfa89139ff7bd5dd958be3b55c33612ba7b1fdc79e7990ac4a8cb348c15cf90b19bc1ae5fc40b96d652d68c9e93c9a6a160227333ddf4c3e29bdc0c9fd220fa53a62a8fcf78c71fb300bad2491bbfbbb70b4cd8b8c1e4716a5d8b053b1629a46858e36c9a0a1b465d968fc150c4985a1ac2f45937e045186656d05af2e173645be2de2c2d7f362c47ec626ff65a8bd4055b1ac3e0aa7b121fb7abec0ef4dfa2e387284aa0740ca7aa88e0a86e6597dd182d6e868434e7155666b7264a48ac0302de60a3b023300bd36bd111d0bad5fa1deb39cabe868d92d3da90123f8fba1e507c997655aa5f5fa7f8615bf6cf781c268e5667fc25b401c0fa5cc9e38abd6ba26461ce3b92f9b4b4aab6141d9adc1adf74006cbb9ad95c1ffc48327ff6472def476794f1b881e8171c48e41a9c30e500d5285c32e582b7521aef781a01f0c208feb293d172fc60ae3d0760815494758674f1fd2dbec73a6a7717b09ff69b47251ab35e641891ccfea74c3dec570e96862b9bab934b77197195c6b05f1a883d98d3830f7ec4893cb7c32120764ea455e80f75eb58fd8f6663e0740dfa37820bf8063ca92d164c97becd9c9de2af2acca9d2c1e9c1605d08702ee607c47a96cb45ae23e22592bdd330a8251a369be7967e6b1136d13030f68346e442194e3d48be28e0c5ece75f03ab84cfd31bf6af927dfc78cb1c467798e40613532a69cf5b76a3ede4d2ef0ac8c20de55743421fd17d010af760de1ca3b3a40943942bcd3b5fbc4dd4c7eb8dabda6f34af24826c08a4cf2f60602cfdbf2bb5ef6df776e56255ae9d416b9700f5e3684bc2efb547cdc2739f94bc5a4ee79621ab169d8db492701f9891f4eb0c909318a27d83c61945c244e73d35fd236675c9ebc853abf7c02247d9fb6faed25d7c4812655418c1399dcb56c6ed73887bd883cfc102a739080c128f3554200d42672ec2cd29b9e3391744eef56b1187a6e549d2d7b41c5393258d4f6be3dcb6ba9effe046dc6cd4b19e3a075bc27aab142a1103280baa0043794c974ea6175c78d2e5a6eaac951242a3c8fcd17058097ecb5770dec7fba983199637293f28fe2221d4be81b8c246d778e52a6219b9f4612f79242fafef5522bfddb4cb1a90e9f01f84b5d9fe6a25db2689870c5b458e61766a71643eee90bc754e35750abf8c95b78d01d63d7f830be0bc0689771f98c1e030323f4d9d10ea323441db27a60ef3925c35b8b179a89416708c442cce372c9cdb5b2263daf4088d39d9e8f5c7d53a72beadf6548480f8a54aa41cd0f26634685bc02c6754daca28505f3839d9d436a8dfe45125972ccf7cfe0fbcf41b5a77b98edf62b3b5011843ca93430dfcee865e2177bf3ec2a2e9cec138e2b76af6284055b03f51549a7d95214986205ba752e75b318966a00ff842ef27e03c357dc06946f3a1122ea11a48e06229f7bcffb83c57f5538df2b84355eb8008898c317e4117dc82fc5f8d9c85acc75004d79d350954836acb8785c39dd11495fb5b877d3703d6df282bb2e404175f63e3ba5929f6463d9d6ade711ea8fe0951cb825870abcad02c3ffccb09bfde90e97881e86adfd59775816d7e8dfb3d2ba2a94449c2979b9fc9e47ea4f8405455442fba7a018bc18a8fb4cfd3a8c7bc9a3a15e38700e0522c957d49f6e6a7329c0fa3e1e849acb41eafd1af12ad4dc7e51b8278b17a5843f681eeda399cef05900497f0bbed806bfc6338cd0ac35d3b07d9402163544039f9db5b2692d53198bca88189b8626052bb0458229e3838fbe826f9a8c78fe6b71c44209fb80c0ad2248c103977e4ef3c141d5b0567b85f27d5dd4b7f63d4f20f2fa96fe185edd0955763e54046c06e315ea8efd1012bc69d0889cabffbb7561c7c9f14cbcaff10251fcabd57d46a62edee73644a6e56bcf0e8cfcbfd2914816715058904519aa4e027488ac9a48a456a4c98ee86d443eeda40ba937ce317d3f4053754d6903e6bb0084643933469475d759e341a49cb71d760a099ae2be07c0d35b96e458c58e70d31a4f992893e9df2285a150055e792adcc031f3cb3d889def36c4cf29944d18f931cb1917c53d69e0ca7fb977e401d6b49ccd2df2d48c8eb9e503e2cd597fd2713fda1156bd612ee205e5fec2f381fd5a59d9ae7ce20be207f226932ecc68888242200ddef705fcb1831eb4d6f250a1a8f18a77aa13163ce9ed7d25c1dbb82f27ad3da2a05b20679be5e7c12cb54af09780ededb6887262e70b00d7a4ea64d001328d57212d3129795d33f14b41dee48154c003b284da1568f00a21554b7372f2ad07cbba5656c76baa3084157a78634e8b0d4bc37f59211ed48e87c1369e0a63a559230b1fc6c676ed0ceda9a3e0f8055f391db006b6d2e2c9dc9e6fe4dd2c13b446ae2d81226b9aaa087ef542556f05f0d37420335097e2e6856e01a05c63397449507a783be115474d9cb708481fd324c510b5403ef6657f116a08fcea462bf79774ce0b91a537b432011c59d44976129e128265c283f83ad9856c2d67abbd5497f73316ae4dcd050d17bd03a8e6d93b6aac25847b4464cf71c14ea4e3a9a1f27195368319d5031d7a4dd2f6ae68acbbb053d8e45ec005519851ee7fced6bb20998874dd8d9e132c8d29ba2779235371cc19d01f99a2edbb672f720cef012c4358588100779c563ea0609cdb3ef0cfc665fe080a7649c202a848e3f384cdd98cdf11b8ca636e0cacd19f9a7e9f6e93005058df80808e8f6739c99d9ba631f5b035b763563494b9180e8384dab4ecb90f73183f759794bbf33b4d97a09157e48d9c6ebcc489f56071cff2b23f8e006ee2ab1781f7b87b358b94b79f9ec348a4375ef85649b5155049c0b506c019605034927a32d5cb6500cd998ac6abcaa764c5acc7a66b45e508998bdee3e658436cee486335bbb49d8492d436ac0b1ba218a554817162ed5c0ee488e8a64f7b98456e206369c312d3bb07ff47a651c91fa886cd0710391241c5ea4f5b44707c292f94cf156a7fc0959039bfbcf523b0fc65737fab10d51c4a260b703e21c2ad97f2b6bb026b983d6189d463613b550a659e0c6805592972112faac3d4fe2de31c4ec67a95992a2c4a7a0c84758afe4fa1a02058728610a9f9ecc358850a7c7f2886b5b3e73b3e6c9d84c43963cef74da69ac1db2e6e963d033eeb7750c81003e0e3f1d95fee16e6a8c9eef99029514af1a5c706b63648be2e6941793e5a8097c9a8de550fff0c1c98df2ce7309ae4ed2d1597e2bffb5540660f094c8fcd1b1ad098373accfaf60227cb8d088c7f3f4991b8b53fc2db709dcae4d22f8c3ff52beec6ddb609c2af5952db204e91e49195a68fdde3ee6efa684987ed081ca07b9b3f3247994f6cd3bc0b7b9f6fbc89ac1b397ec78c022c18cd8e9a9e517dbf9e0a8a37cf1fa42f8c19811997cdbee3056c4f8a644cf186856d417e03213558e9bdb7214f5f41eab7e97763c8fbb154cc039e3ce74fee7227c9407708363f9c0421a2126d3a28911fb396b553f2cb91f97dac6bdf0d35e8b3dac3db2524d63f0de81c6d00bfe339e5e0ff05e7345a434ddddd6dc20391295185f2549b8e930fc8c0def2f620e537b7d64e95a20a17da01b28c79dd95b96634a1d5b0edaf6b0b4fd1a63d89af213593e9fc594a56e4305e73fe5d34a6f79184ec63999a80bbcc0d3fb87463ccc0ba94ecd2557989cf2a033ecf2625d60d5378c5a99b9bd55551fef2e6da215715c33a6069172178cec76b230004de0e3fbbb1b8c5a5077e53a2e1f08728c72ac1bee1b651206ed4fe88db40222f8b5090061ce92865a27f740e5e9db2beaac7b5b5985829487d4ac8872209663dee56707afdf9ae62b2244021d0f633330bfdba6e33bc5a7936c42c634c00871691194bfdae6ad9a22691148d3f91706327e278cd261464973f87602b4a738728d606180dabf70fa9c8bb328827692ba4e7589dbb569bfffed91018925e6961fe4a68a6f5e0b0c212ee281593592938412dc4d1f8d2d1269aea517d6358f66b6818b71eb8729628e8d09b1ff4343e56f03694940d772cb552922ba90c17ffe57f7a1a030979c25514cfb8e44fc1cce7ad7c34d51a6f10a5d583cc703a3f2b077dbce1536b04a06f7263b045eae23bbb383fab0836bed98453ad93fd92eb72a83d678906325bab9b2450fa14f4b3ca07ffe69512405f6fc448b4336405a3042d8fa19936b01de2e017509aeb4323613caed63ec3433708754ed26fadec3d0a74fbbf0e29d33bc156f8cbb484ca6dd63856353548d8172f84706fe5751afa8e1cd4af1868fd3b679267b975e04ae90194d68817f0d0f6235ad8a47a10ff8cc6a513f3d5cbc4859712083519ad1cb4017ccf3972fac6a877661604b9b90f110695174f62ad84d295ac4bbec1918b4c74636b27fcf10498719c0f1d2bdf6cd111ab19f3c8bee592698150e0263a72ccf5f1dca05f52badfc758f81fe692e5014e45c443359a09bb45c19384efd7bf0be668902dde16e75401f9b9c947e1a45ee199f0de363c8c2221721fd4685f0bd2a3e60c0a28449a1e2e0114ad1f25173282f12cd6f3e88b06090b601e098563f78adf4fe7b75d711086f9018f1f62566623661abc16f975fcfdad7ccc25118edcc5333b2581cc0a898de1c5cdc93c5f0a8f06c4a7c63c65c13f9426f0e3f3d3b7ac4cc79c65ce015664af10b181fd0254503e822df892edcaa5850dfce49ce1f6bff9b110ae44fe80df1049cd617cf91c3b170ee88470a830811a8ca81947f8a18169bcfac830d398362decd31fecdbfed39d397140099dfba81b65ca50b406d5fdb693719084158192685a61f8b899dc2ef33b454655336ba2d947203579ec0f3a907389142d6ddbe2dface402532fb5774e81484c96897e7ceaca55e83c15e3b4d2d0847343b4b9d874054b7d75760ab82361270e31be5d7443d0cd926ee7e319306d61ac0e589babde8f2c8e43c58eff079b303b22611280f85db2d50a4591215ba5c6c54db84f80505a0fcab7fd0184029ac52cb328b624b232c0e1beef2a128fed59ba079cd58588485a55e997d8e53cee60d316ebe3367b00aa9dc4206490fe15c1f13bc9f53ff3587ca9d1d9eb6abab9bf3a8180bfd7d7dcfd512be9d055924d44315c88d7b4f28a721d334287be5518d562c66b3a2a9ee661b369d6dc92aa25516211ffc05580c0e0db5040cd7b11aa693d5409ac949a9d740e146d9a59fd2dae3f0dfdaad2b9de00da458af2a552dfd536980003872e9e6d758e9fa419e3757d39502efb1a8b08f634540e278fcdc5984358d61d3a29542b86f041") syz_open_procfs$namespace(r0, &(0x7f0000001140)='ns/mnt\x00') (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001180)={0xffffffffffffffff}) (async) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000011c0)=0xffffffffffffffff, 0x4) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001200)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001400)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0xa, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfb, &(0x7f0000001500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001540), &(0x7f0000001580), 0x8, 0x46, 0x8, 0x8, &(0x7f00000015c0)}}, 0x10) (async) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001740)=0xffffffffffffffff, 0x4) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000017c0)={0xffffffffffffffff}, 0x4) (async) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001800)={0x0, 0x401}, 0xc) (async) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001840)={0x1b, 0x0, 0x0, 0x71a, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001940)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000018c0), &(0x7f0000001900)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x4, 0x16, &(0x7f0000001240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffff80}, {}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001300)='GPL\x00', 0x8, 0xa6, &(0x7f0000001340)=""/166, 0x41000, 0x54, '\x00', r4, @fallback=0x7, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x4, 0x10, 0x7, 0x7}, 0x10, 0xffffffffffffffff, r7, 0x3, &(0x7f0000001980)=[r8, 0xffffffffffffffff, r9, r10], &(0x7f00000019c0)=[{0x5, 0x1, 0x6, 0xc}, {0x3, 0x5, 0x9, 0x7}, {0x0, 0x5, 0xf, 0x1}], 0x10, 0x10000}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r8, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)=r2}, 0x20) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001dc0)=@base={0x18, 0x3, 0x6, 0x6, 0x18002, r3, 0x3, '\x00', r4, r1, 0x4, 0x3, 0x0, 0x0, @value=r6, @void, @value=r3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001f00)={0x11, 0x9, &(0x7f0000001ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @jmp={0x5, 0x0, 0x3, 0x9, 0xb, 0x10, 0xffffffffffffffff}, @generic={0x8, 0x7, 0xb, 0x7, 0x10}, @ldst={0x2, 0x0, 0x1, 0x5, 0x9, 0xfffffffffffffffe, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000001b40)='syzkaller\x00', 0x9e78, 0xc3, &(0x7f0000001b80)=""/195, 0x41000, 0x30, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000001c80)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000001cc0)={0x4, 0x3, 0x3f2b0933, 0xf15}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001e40)=[r12, r13], &(0x7f0000001e80)=[{0x3, 0x3, 0x1, 0x1}, {0x4, 0x4, 0xf, 0x9}, {0x5, 0x2, 0xd, 0x8}, {0x3, 0x2, 0xf, 0x2}, {0x4, 0x1, 0xa, 0x6}, {0x2, 0x4, 0xb, 0x7}], 0x10, 0x1ff}, 0x94) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001fc0)=r5, 0x4) (async) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000002000)=""/190) r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000020c0)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x80000000, '\x00', r4, r6, 0x1, 0x3, 0x5}, 0x50) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000002140)=@bloom_filter={0x1e, 0x8, 0xb, 0x6000, 0x0, r14, 0x8, '\x00', 0x0, r3, 0x5, 0x4, 0x3, 0xb}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f00000021c0)={r11, r3}, 0xc) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000002200)='\x00') (async) close(r1) (async) write$cgroup_pressure(r3, &(0x7f0000002240)={'full', 0x20, 0x8, 0x20, 0x2}, 0x2f) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002380)={&(0x7f0000002280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x3, [@struct={0x7, 0x4, 0x0, 0x4, 0x0, 0x4, [{0x1, 0x1}, {0xa, 0x6, 0x200}, {0x0, 0x5, 0x5}, {0xb, 0x4, 0x7}]}, @volatile={0xe, 0x0, 0x0, 0x9, 0x3}, @var={0x10, 0x0, 0x0, 0xe, 0x5, 0x1}, @enum={0xa, 0x1, 0x0, 0x6, 0x4, [{0xa, 0x8}]}, @typedef={0xa}]}, {0x0, [0x2e]}}, &(0x7f0000002340)=""/60, 0x93, 0x3c, 0x0, 0xff, 0x10000, @value=r3}, 0x28) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000023c0)=0x5) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002400)=r5, 0x4) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002640)=@bpf_lsm={0x1d, 0x11, &(0x7f0000002440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x957}, [@map_val={0x18, 0xa, 0x2, 0x0, r10}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}]}, &(0x7f0000002500)='syzkaller\x00', 0xd3, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000002540)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002580)={0x1, 0xd, 0x5, 0x4}, 0x10, r5, 0x0, 0x5, 0x0, &(0x7f00000025c0)=[{0x1, 0x3, 0x1, 0x3}, {0x1, 0x2, 0x0, 0xa}, {0x5, 0x3, 0x7, 0x2}, {0x5, 0x4, 0xc, 0x4}, {0x5, 0x5, 0x3, 0x3}], 0x10, 0x1ff}, 0x94) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002740)=@generic={&(0x7f0000002700)='./file0\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000002a00)={0xf, 0x2, &(0x7f0000002780)=@raw=[@exit, @call={0x85, 0x0, 0x0, 0x16}], &(0x7f00000027c0)='syzkaller\x00', 0x7, 0xf6, &(0x7f0000002800)=""/246, 0x41000, 0x38, '\x00', r4, @cgroup_device=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000002900)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000002940)={0x4, 0x5, 0x10, 0x1}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000002980)=[r9, r3, r12, r9, r14, r8, r14, r13], &(0x7f00000029c0), 0x10, 0x2}, 0x94) (async) write$cgroup_freezer_state(r10, &(0x7f0000002ac0)='THAWED\x00', 0x7) 3.831224532s ago: executing program 0 (id=4962): ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffff6c4d) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4e, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x6, 0x3, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001140)={r2, 0x58, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180), 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001280)={{r2, 0xffffffffffffffff}, &(0x7f0000001200), &(0x7f0000001240)='%pK \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000180)=@raw=[@exit], &(0x7f0000000f80)='GPL\x00', 0x8001, 0xec, &(0x7f0000000fc0)=""/236, 0x40f00, 0x4a, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000011c0)={0x3, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001340)=[r2, r5, r2, r2, r2], &(0x7f0000001380)=[{0x2, 0x4, 0x8}, {0x5, 0x4, 0xb, 0x6}, {0x2, 0x2, 0x10, 0xa}], 0x10, 0xffffff1d}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b70000001a000000bca30000000000002403000020feffff620af0fff8ffffff71a4f2ff000000001f030000000000002e1a0200000000002604fdffff02000014010000030000001d140000000000007a0a00fe0000001f0f14000000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f300020000fe275daf51efd601b6bf01c8e8b1b526375ee4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff61623604000000000000006a89adaf17b0a6041bdeebdfd1f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564163427afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101a3062cd54f9ff51d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566d674e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48153baae244e7bf573eac34b781337ad5905c6bbf1137548c7f1a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a90144022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab540b8d7b4ead35a385e0b4a26b702396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb11883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcd857ab15e355713767c536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ced301efeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef0981000000000000ff0f40b1888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fc08001011e32f80fb60e14b9eee094277bbc170882c8890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e3f753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bb25b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963342aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b6ef9d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec035d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf79a43746979f99f6a1527f004f1e37a3926937e84fb478199dc1020f4beb98b8074bf7df8b5e783637da740800000000000000c55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae633d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a6a2740000000000000000000000000000000000000000000a0009dd14b38f2f4426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4100260ffcd8f1d04166d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb0000000000000005375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10baa804a707f0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d34d3757b1450fdb0a9a69f432e277f3a0386eb2bd3305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07618b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e040000003c3ffad44d2a376def42e41e9fc31678257e040fa7cf32c221aaac08000000000000001a00000000000000000000173570f0c11ae694b0f7a4f9c2f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d641ef02e4d5295d756e110522a7a945b93fb705b95b6aae27a8fb33732ce1da1c0b1af8eb9222a06e984ab1e6984c8bdc12360627137ab67b6b68ab08acb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481efe46a4ce86be0b1d8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0c6cb4bed8594a39bd76d3ef8a7ab014e787596db796bd93a36c2880423291e3bccc86f66ba792ff4d87b3f80e5908779e51c5e9055fc5b23605cd000c723187ef09dcf4b07b06a9342f3f62ee7acddff292082c1f4d8eb9561f80873a09a1ae0c9af1121175e5600f43a1179484502009759264a5729f07c2b218fa36ba2316a99aaad0130df83d0bda1e711290f78c143ea143967b00adcd77e6ad5e48d839ea61aadb83e4d071c54691924a3830d3e7b5c198bb0ed623153590000000000000000004b985ea1702f34f2f85b168c083e810ed567e3f1979b9ed1a4bf6a10dac825c96a0828b335de445a4880bb6474157efd1a72ca46ae4cbe3ab648c9bc4867a5a4cb87d7d6d55475b34b3cb6aa9e2337d4e04a37e35109752522ac9b186ddd80c47da6a2f4ef7bb909c975520000000000000000000000219cf5c1376ab33786f6b856d354e90a2733f78f2d188057cead3480eade49d55b770fad7fa000d23da6275768810b6b2df91d3a991ea98d929d271696c258d5b735d5db11df434e7dd1b7c1ca05cea3977df564115f4ec6ffab1d2ff8a642ca50934b3fbe44b0abeba9df209566984a29dfc0466e439a94e177b3c4d5f6e92b8176b9d6ddeeeb196fa964217f88e1acc180aaa4"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xfffffffffffffd27}, 0x48) 2.822355551s ago: executing program 0 (id=4963): bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000f40)={0x5}, 0x8) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000f40)={0x5}, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x11, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, 0x0, &(0x7f0000000240)=""/19}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001240)={r0, 0xe0, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000f80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x68, &(0x7f0000001040)=[{}], 0x8, 0x10, &(0x7f0000001080), &(0x7f00000010c0), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000001100)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001240)={r0, 0xe0, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000f80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x68, &(0x7f0000001040)=[{}], 0x8, 0x10, &(0x7f0000001080), &(0x7f00000010c0), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000001100)}}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001280)='blkio.bfq.time\x00', 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001280)='blkio.bfq.time\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="1e00000008000000810000000104000018010200", @ANYRES32=r2, @ANYBLOB="0400"/20, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="02001200030000000420000007000000000000000000070000000000"], 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x1400, 0x0, 0xffffffffffffffff, 0xde6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x50) (async) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x1400, 0x0, 0xffffffffffffffff, 0xde6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x4, 0x6, 0xb}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2000018c, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000400)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={r1, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcc, &(0x7f00000006c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000700), &(0x7f00000009c0), 0x8, 0xc, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b80), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)=@o_path={&(0x7f0000000c40)='./file0\x00', 0x0, 0x401c, r0}, 0x18) (async) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)=@o_path={&(0x7f0000000c40)='./file0\x00', 0x0, 0x401c, r0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{0x1, 0xffffffffffffffff}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=@base={0x9, 0x16fb00bf, 0x7, 0x10000, 0x20000, r0, 0x4, '\x00', 0x0, r1, 0x5, 0x5, 0x5}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x21, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x912}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000500)='GPL\x00', 0xfffffffd, 0xe7, &(0x7f00000008c0)=""/231, 0x41000, 0x2, '\x00', r10, 0x1b, r11, 0x8, &(0x7f0000000bc0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x4, 0xc, 0x4}, 0x10, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000e00)=[0x1, r12, 0x1, r13, r14], &(0x7f0000000e40)=[{0x0, 0x4, 0xe}, {0x3, 0x3, 0x9, 0xb}], 0x10, 0x8}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) r15 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@float={0x8, 0x0, 0x0, 0x10, 0xc}, @union={0xc, 0x2, 0x0, 0x5, 0x1, 0x0, [{0x10, 0x4, 0x6f4}, {0x9, 0x3, 0x6}]}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/248, 0x4b, 0xf8, 0x1, 0x7ff, 0x10000}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1d, 0x2000000000000221, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000054000000850000001000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @lsm=0x1b, r15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1d, 0x2000000000000221, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000054000000850000001000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @lsm=0x1b, r15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.563382794s ago: executing program 3 (id=4965): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x1, 0x0, 0x0, 0xff, 0x0, 0x1, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext={0x40c}, 0x20006, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x1, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000040000000900000000000000", @ANYRES32, @ANYBLOB='\x00 \x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000c0000000520000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000001b00), &(0x7f0000000100), 0x3f, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r2}, 0x38) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1b, 0x1, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_to_bond\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xef220100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0000000000000007000000f8cc796b61040000", @ANYRES32=r1, @ANYBLOB="e300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000003000000030000000600"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="05000000000000006b113e00000000008510000002000000850000000500000095003300000000009500a505000000006901ee3d8cf6fbc48bc095b6462f7756"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r3, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3b, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x15, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@map=r1, r3, 0x16, 0x28, 0x0, @void, @void, @void, @value=r6}, 0x20) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={0x0, 0x0, 0xfffffffffffffd92, 0x0, 0x1}, 0x28) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fff, 0x7}, 0x52ebcc5d7b91d07f, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{}, &(0x7f0000000180), &(0x7f00000002c0)=r0}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000004000000850000006100000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000bc02000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r8, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000300)="d2ff03076003008cb89e08f086ddeff9be34b6dae4a93a276032b785807d48097d74bddc47527f7f", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 2.562889514s ago: executing program 0 (id=4966): syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffca}, 0x164) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1d, 0x14, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000}, [@printk={@s}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @alu={0x7, 0x1, 0xd, 0xb, 0x5, 0xffffffffffffffff}, @map_fd={0x18, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @ldst={0x0, 0x3, 0x0, 0x7, 0xb, 0x18, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x1, 0x2, 0x2, 0x2, 0x0, 0x4, 0xfffffffffffffffc}]}, &(0x7f0000000340)='GPL\x00', 0x6, 0xff, &(0x7f0000000440)=""/255, 0x41000, 0xd, '\x00', r0, @fallback=0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x9, 0x3615, 0x6ae6}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000580)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f00000005c0)=[{0x4, 0x5, 0x6, 0x7}, {0x3, 0x5, 0xe, 0x9}], 0x10, 0xc}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001800)=@bpf_ext={0x1c, 0x4, &(0x7f0000000100)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}], &(0x7f0000000140)='syzkaller\x00', 0x10001, 0x1000, &(0x7f0000000800)=""/4096, 0x41100, 0x60, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000180)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x26cc3, r5, 0x5, &(0x7f00000006c0), &(0x7f0000000700)=[{0x4, 0x5, 0xa, 0x5}, {0x5, 0x4, 0x10, 0x1}, {0x3, 0x4, 0xd, 0x7}, {0x5, 0x1, 0x9, 0x4}, {0x5, 0x1, 0xe, 0x3}], 0x10, 0x10}, 0x94) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000100b7040000000000008500000033000000850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r9}, 0x2c) (async) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x42, &(0x7f00000007c0)=r6, 0x47) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000018c0)={{r4}, &(0x7f00000006c0), &(0x7f0000000780)=r9}, 0x20) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xd}, 0x94) (async, rerun: 64) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r12, 0x0, 0x0}, 0x10) (async) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[], &(0x7f00000000c0)=""/42, 0x91, 0x2a, 0x0, 0x5}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1200000008000000050000000300000000100000", @ANYRES32=0x1, @ANYBLOB='\a\x00'/20, @ANYRES32=r0, @ANYRES32=r13, @ANYBLOB="010000172907d68bf5e8c7556a0fec00885097000100000001000000"], 0x50) 2.24871556s ago: executing program 2 (id=4967): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="09000000080000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'nr0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2d}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) 2.149174035s ago: executing program 2 (id=4968): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000071104d00000000001f010000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x6, 0xfd9b, &(0x7f0000000240)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcf2}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000072000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x40, 0xfffffffffffffffc, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000001040)=ANY=[@ANYRESDEC=r2, @ANYRESOCT=r3, @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r1, @ANYRESHEX=r2, @ANYRES64=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r7, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0x11, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0xffff}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000400)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x1, 0x10, 0x800000, 0x2}, 0x10, r7, r2, 0x6, &(0x7f0000000840)=[r8], &(0x7f0000000880)=[{0x3, 0x3, 0x2, 0x5}, {0x0, 0x3, 0x8, 0xc}, {0x4, 0x2, 0x10, 0x9}, {0x2, 0x4, 0xc, 0xa}, {0x5, 0x5, 0x3, 0x7}, {0x2, 0x4, 0xb}]}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x2800000}, 0x2c) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@type_tag={0x3, 0x0, 0x0, 0x12, 0x5}]}, {0x0, [0x61, 0x5f, 0x61, 0x61, 0x5f, 0x30, 0x2e]}}, &(0x7f00000029c0)=""/4096, 0x2d, 0x1000, 0x1, 0x4}, 0x28) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYRES32=r10], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r11, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.671401818s ago: executing program 3 (id=4969): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x2a}, @printk={@lld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffdf) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000084000000000000000000007ea500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x84}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 1.670650458s ago: executing program 3 (id=4970): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_bp={0x0, 0x9}, 0x1c06d, 0x2e, 0xfffffbff, 0x3, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000001000000000007e000000de7e654cac976f3c8dcaaddbaddcda3adc2edd3c2af343517863417c6a5d2bebc31cbee6c9bb64b69144087b2664b2770750a9a9aa72de17f8b49d9cd85c8698a11a60f8ea758aff5d656d46c3adea9801d7408ba5a22ccaad2e02f692f4aae6000000000000000000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x5, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000580)=ANY=[@ANYRESDEC=0x0, @ANYRESDEC=r2, @ANYBLOB="00000000032c1f33b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000000000b7020000000080007b9af8ff00000000d6090000000000007baaf0ff00000000bf2700000000000007080000fffdffffbf94000000000000070400005863e62553392ff0ffffff640200000800000018220000", @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000005000000b700000000000000", @ANYRESDEC], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0xfffffffffffffffa}, 0x100000, 0x8, 0x7, 0x0, 0x0, 0x8001, 0x7, 0x0, 0x40}, 0x0, 0x80009, 0xffffffffffffffff, 0x11) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x848, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x4, @perf_config_ext={0x4, 0x3}, 0x0, 0xc, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a3, &(0x7f0000000080)) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)=@id={0x1e, 0x3, 0x1, {0x4e24, 0x1}}, 0x10, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)="1c11636e4f729feac613061f72534dfd9c6717d2787a159bb975b18cdfba330b8cdcf9dc58f3745b87a1f5bbe702c167ba8bf43d930faf13a5f3e13ea2e2a5275ca9e6e748b9a0aaa603359c98235bc1cec90436c9", 0x55}, {0x0}, {&(0x7f0000000140)}, {0x0}, {&(0x7f0000000400)="14a5ca71ae511837e7a2d28b30df5840a61beb42db39c3061561aabfc7329f2fb490e2f09514b6dd5bd21ff8700d78142c5226445865dd64a4f9d5a66661f9bb909eebde72dc8cc61720476c05ec26749d2ec3bda89bf017bc220d3e99caa3cb7eb4f5093e8c6b14d5fe552e9d32197dffa5cadcf214ca0b1d67ca2358c6282fce634befbbd9217325", 0x89}, {&(0x7f0000000240)="3f44ae49098c81f79e10f57ca972e2dd58b5594d346c60cf4d8bf79a99c87f7d97520a5591c814183b386bbf8ab06baf547743", 0x33}], 0x7, 0x0, 0x0, 0x20008000}, 0x20040084) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0x3, &(0x7f0000001ec0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) 1.523591376s ago: executing program 2 (id=4971): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1}, &(0x7f00000001c0), &(0x7f0000000200)}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="050000000500"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r0}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x10, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x7, 0x4, 0x0, 0x8, 0x0, 0x3, 0x214, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x4, 0x4}, 0x100000, 0x0, 0xfffffc00, 0x5, 0xfffffffffffffff6, 0xd11, 0x1, 0x0, 0x9, 0x0, 0xd70d}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r2, 0x0, 0x36, 0x1b, &(0x7f0000000000)="e04ba9e333c6c95009d9a0452ba5c9cf3f85280c66d616004f835da379536042f9c33fa81e2e702ce0f395fbad29750687f739bce5b0", &(0x7f0000000400)=""/27, 0xb, 0x0, 0x82, 0xd, &(0x7f0000000440)="6ee2a80c57d0431a53b8b26f7e01601dc6833f594f7400a12d450ac885d1b6630190c3246e9ff2cefeaa3cd0bf9a8d67641b8900b2a031254e9c917224f7be44da52f04278cd5933540dcdd76a776915cac468c1302239ce0545bcea8e60178d0ee89b97b1ab1eb6e6e878cb7565444054662a228598a328500b2c2dc612246fa38e", &(0x7f0000000500)="384913614f0647196197f029d0", 0x4, 0x0, 0x3}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x11, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5a}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x0, 0xa, 0xa, 0xb, 0xffffffffffffffc0, 0x1}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @ldst={0x2, 0x2, 0x1, 0xb, 0x4, 0xffffffffffffffc0, 0xfffffffffffffff0}], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.485023137s ago: executing program 2 (id=4972): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000100000000000000000000007b010800000000009500000000000000e06cae549515a66d78d89d20d71216155749550926433e707951b2a7093a5bb0548de11ed1ee86d312d4a8dacc"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x80) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1802000002000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b0000009500000000000000150511203fb0882e4d2daf4d63c71dd50a282e707847831514b53142a30e4ed5c31d601563438e1c516544fc658f1244f1567b811985d944c76ca91fea9db4ea826b053069a291b3f309e74aba82192ea57289673ca6453a02ea143410c30a3236daf9a64df983b280d79f3d32a937764789ae7c14901a8b390f816d39ab47983ac9e5437639f1"], &(0x7f0000000080)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.396532702s ago: executing program 2 (id=4973): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x19}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000080)={r0, &(0x7f0000000080), 0x0}, 0x20) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x34}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{r2}, &(0x7f0000000540), &(0x7f00000006c0)='%pB \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.341151194s ago: executing program 4 (id=4946): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{0x1, 0xffffffffffffffff}, &(0x7f0000000a80), &(0x7f0000000ac0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1b, 0x18, &(0x7f0000000140)=@raw=[@ldst={0x1, 0x0, 0x0, 0x5, 0x5, 0x0, 0x1853eafae1b83c64}, @generic={0x5, 0x3, 0x0, 0x9, 0xd856}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x23d}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0x2, 0x9, 0x4, 0xfffffffffffffff0, 0xfffffffffffffffc}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80}}], &(0x7f0000000040)='syzkaller\x00', 0x7ff, 0x4c, &(0x7f0000000200)=""/76, 0x41000, 0x34, '\x00', 0x0, @fallback=0x65e7ed91fbf55c9, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x8, 0x0, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[0x1, r0, 0x1, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0xd}, 0x94) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x6}, 0xc) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={@map=r2, r1, 0x4, 0x2018}, 0x20) bpf$LINK_DETACH(0x22, &(0x7f0000000640), 0x4) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x4, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x7}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="060000"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711834000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000007c0)=0xffffffffffffffff, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000800)={r8}, 0x8) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001a00)={r7, 0x1}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8, r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r11, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r12, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x8cff, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000006c0)=@o_path={&(0x7f0000000680)='./file0\x00', r2, 0x4000, r10}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000006d0ae6c3000000000000"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a40)={{r2, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000a00)='%pK \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@map_fd={0x18, 0x2, 0x1, 0x0, r13}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r10) 1.247629819s ago: executing program 4 (id=4974): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x1, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f0000000340)='GPL\x00', 0x8, 0x1000, &(0x7f00000024c0)=""/4096, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x6, 0x1, 0xe4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000400)=[0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000500)=[{0x2, 0x3, 0x7, 0x6}, {0x3, 0x2, 0x6, 0x9}, {0x5, 0x4, 0x0, 0x6}, {0x4, 0x5, 0x0, 0x7}, {0x3, 0x3, 0x7, 0x1}, {0x2, 0x5, 0x5, 0x8}, {0x4, 0x1, 0xe, 0x5}], 0x10, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xdf}, 0x10020) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r3}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x1, &(0x7f00000001c0)={&(0x7f00000014c0)=""/4096, 0x1000, 0x0, &(0x7f0000000140)=""/63, 0x3f}}, 0x10) r5 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f00000002c0)='blkio.bfq.sectors_recursive\x00', 0x26e1, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110c23003f) write$cgroup_devices(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="80fd"], 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x4, &(0x7f0000000240)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x2c}, [@ldst={0x4, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) 1.21945072s ago: executing program 3 (id=4975): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="12000000040000000400000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xd, &(0x7f0000000f80)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000180)="cdcd20c4c67739971d4828246261fa9f6d455ef173c2220089ddf85cc34f218ed395417b369f2f16f66fba82d5b32526454cc236a15c024c922f9563a79725cbd2eb89c046b2ae0833397d0aa531732d9164096fdf365a7b72cfed8cf6083b73c63081891a875e38bb25069e57e007d8f8d81cefb9514e472cdad7129a58504f0ca0cfc1", 0x84}, {&(0x7f0000000240)="b487dc2fbdb644e8fcc762042eadf8c1a59ec33d0f567ba50eacbfd606894b5e5ca148276d37a1415e7ba0fbabede47a87613bd05ca6bebaab1e954ef3eb6ff56f6556b3aaca056b99e183d8700cb37bd7a152feaedd5c59fa9203fdc3d45430cc67a5ee7801e3f20455989f90d8aacd754448117fecff15c5a6d57f7c922521b8e7cb65d8c83f9b7f5a59b891428f76eeb963f1c0a99356d210789b18327c663e78c1e45ea93c54e95e0c554e1a6b85933b47bfec3923d5e639e6cfd38be8a7df1efe4be4508ec2df29903f", 0xcc}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11}}, @ip_retopts={{0x38, 0x0, 0x7, {[@noop, @timestamp_addr={0x44, 0x24, 0xaf, 0x1, 0xc, [{@dev={0xac, 0x14, 0x14, 0x31}, 0xa4e}, {@multicast2, 0x6}, {@broadcast, 0x6}, {@local, 0x5}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @rand_addr=0x64010101, @multicast1}}}], 0xb8}, 0x40) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xc, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r2, 0x4, 0x18}, 0xc) 1.081779267s ago: executing program 3 (id=4976): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xfffffffe}, 0x10}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, 0x435d17f4551575de, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x500, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="13000000100000000200"/20, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000057cc0036d5105b8c87f0b4a86e3f3992f282151f394bc3a1083cc8b0303f8331b13af56428ddc31df7cc920d16405e8212479fb71bfd75776e147a6bc43ca3141f7791a4", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0xd, &(0x7f0000000a80)=ANY=[@ANYBLOB="180000000000000000000000aadf000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000130000008500000082000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="d2ff030060010000009e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x1000000, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x4e, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x7000000, &(0x7f0000000000)="e2", &(0x7f00000002c0)="605d2a5de8c22c301d05c189d58a7514e67c7ec8e92ff58edc6a54d36fe4717af1adaaff852107929146f653ac43b6df49db674372d2a62ffde6c3246c330ea3cee19f08b56a4d6147", 0x2}, 0x2c) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x6, 0x0, 0xd}, @exit={0x95, 0x0, 0x7b00}, @call={0x85, 0x0, 0x0, 0x18}]}, &(0x7f00000003c0)='syzkaller\x00', 0x4, 0x92, &(0x7f0000000240)=""/146}, 0x80) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) (async) ioctl$SIOCSIFHWADDR(r4, 0x541b, &(0x7f0000000340)={'veth0_virt_wifi\x00', @remote}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.0199503s ago: executing program 5 (id=4977): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adfabaef7b986", 0x0, 0x8005, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x6, 0x0, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) 1.0181582s ago: executing program 0 (id=4978): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1000000}, 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000200"/12], 0x48) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x56}, 0x28) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x3de1bc55ef753a8d, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) (async) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async, rerun: 64) socketpair$unix(0xa, 0x2, 0x11, &(0x7f00000002c0)) (rerun: 64) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async, rerun: 32) recvmsg(r2, 0x0, 0x10001) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r6) (async) write$cgroup_devices(r6, 0x0, 0xa) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x1, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800f66b990e6503d98f0000050000002f0000009506000000000000000900009b8896895f3c77479fc46b0dcd5a5821de2b95bd48282cf5f7982f8ecdbe5437ffe4aac06cd4f4cbfcefcd0c31b4957eba43ae7da8846c5e4b"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r7, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (rerun: 32) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r8) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (rerun: 32) 944.800264ms ago: executing program 3 (id=4979): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x900000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x20000000000002bf, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x7}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x704, 0x2}, 0x40, 0x0, 0x0, 0x3, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000000000000f37538e486dd630080fc5c082c00db5bffffffffff000000060300000023000000000000000000000000ac1414aa2c200007"], 0xfdef) write$cgroup_subtree(r4, &(0x7f0000000000)={[{0x0, 'rlimit'}, {0x2d, 'pids'}]}, 0xe) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f0000004180)=ANY=[@ANYBLOB="02000000040000000700000002"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x69, 0x10, 0x22}}, &(0x7f0000000480)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000730140000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) syz_clone(0x80001000, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) 430.670579ms ago: executing program 0 (id=4980): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x47, 0x5, 0x0, 0x0, 0x0, 0x200000000000f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x0, 0x4, 0x0, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x7, 0x6, 0x3, 0x100}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f00000001c0)='notify_on_release\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000180), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x11, 0x9b}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x70) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0100000007000000090000000900000000000000", @ANYRES32=r3, @ANYBLOB="0900000000000000000000f3ffffff5c46fcdb1abc00190000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x3, 0x9, 0x0, 0xffffffffffffffff, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="13000000100000000200"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000005000000000000000000000000000a97d7748bc97841b7719192574b53df7445c66b60051da08469612621d6d84073ea33b4e10ad09707961b1ffe10898a0df3e8c60825def4dc6b686a2603d84059f31e"], 0x48) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) close(r7) write$cgroup_int(r7, &(0x7f0000000180)=0x6, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000580)=ANY=[@ANYRESHEX=r4, @ANYRESDEC=r5, @ANYBLOB="00000000000000002f8000000000000018100000", @ANYRESOCT=0x0, @ANYRESHEX=r6], &(0x7f0000000000)='GPL\x00', 0xe, 0xee, &(0x7f0000000340)=""/238, 0x41000, 0x0, '\x00', 0x0, 0x0, r7}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r6}, &(0x7f0000000880), &(0x7f00000008c0)=r3}, 0x20) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0xe, 0xa8, 0xe, 0x5, 0x0, 0xc, 0x8000, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000000c0), 0x5}, 0x0, 0x9, 0x4, 0x3, 0xf19, 0x7, 0x804, 0x0, 0x0, 0x0, 0x3}, r2, 0x3, r0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000540)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8983, &(0x7f0000000080)) 247.849868ms ago: executing program 4 (id=4981): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffd0}, [@jmp={0x5, 0x0, 0x4, 0x0, 0x0, 0x2}, @alu={0x7}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000180)='GPL\x00'}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYBLOB="0000000000000000b708"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e488a863726558"], 0x140) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000003000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x28) 247.345018ms ago: executing program 5 (id=4982): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc2100, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x9) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000080)=0x800) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f00000000c0)) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x2c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x60000000}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x0, 0x9, 0xc, 0xfffffffffffffff0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000400)='GPL\x00', 0x7, 0x18, &(0x7f0000000440)=""/24, 0x41000, 0x40, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x4, 0x8, 0xd10}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r1], &(0x7f0000000540)=[{0x2, 0x1, 0xb, 0x5}, {0x2, 0x5, 0x8, 0xc}, {0x0, 0x2, 0x0, 0x8}, {0x5, 0x2, 0xb, 0x8}, {0x2, 0x2, 0x1, 0x2}], 0x10, 0xcbe0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000680)=r3}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x200400, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000740)={'vlan1\x00', @multicast}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={r3, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0], 0x0, 0xb5, &(0x7f0000000980)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x57, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={@ifindex=r6, 0x23, 0x0, 0xff, &(0x7f0000000780)=[0x0], 0x1, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0], &(0x7f0000000840)=[0x0], 0x0}, 0x40) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000bc0)=r7, 0x4) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x8, 0x0, r1, 0x2, '\x00', r8, r10, 0x3, 0x0, 0x5}, 0x50) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0x1e, 0xffffc790, 0x4, 0x4, 0x20002, r2, 0x81, '\x00', r8, r10, 0x0, 0x5, 0x5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ec0)={r2, 0x58, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000f00)=r7, 0x4) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001080)={0x6, 0x12, &(0x7f0000000d00)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}], &(0x7f0000000dc0)='GPL\x00', 0x3, 0x19, &(0x7f0000000e00)=""/25, 0x41100, 0x32, '\x00', r13, 0x25, r14, 0x8, &(0x7f0000000f40)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000f80)={0x0, 0xf, 0x5, 0x8}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000fc0)=[r12, r4, r1, r2], &(0x7f0000001000)=[{0x3, 0x3, 0x9}, {0x4, 0x4, 0xa, 0x1}, {0x1, 0x1, 0x1, 0x3}, {0x2, 0x3, 0xf, 0x2}, {0x2, 0x3, 0x2, 0x3}, {0x2, 0x3, 0x10, 0x3}, {0x2, 0x4, 0x9, 0x8}], 0x10, 0x7}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002380)={{0x1, 0xffffffffffffffff}, &(0x7f0000002300), &(0x7f0000002340)='%pS \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002440)={{r12, 0xffffffffffffffff}, &(0x7f00000023c0), &(0x7f0000002400)=r15}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000024c0)={0x11, 0x1b, &(0x7f0000001140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @generic={0x1, 0x2, 0x2, 0x8, 0x7e6}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001240)='syzkaller\x00', 0xffffffef, 0x1000, &(0x7f0000001280)=""/4096, 0x40f00, 0x40, '\x00', r6, 0x0, r14, 0x8, &(0x7f0000002280)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000022c0)={0x1, 0x6, 0x77fb, 0x993}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002480)=[r4, r16, r2, r4, r4, r17, r12], 0x0, 0x10, 0x4}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000002580)=@bloom_filter={0x1e, 0xfa02, 0x7, 0x3, 0x2, 0x1, 0xb, '\x00', r6, r10, 0x5, 0x4, 0x4, 0xc}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002680)={{r4}, &(0x7f0000002600), &(0x7f0000002640)=r15}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000026c0)={@fallback=r2, r3, 0xf, 0x2, 0x0, @void, @value=r3, @void, @void, r9}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff}) sendmsg(r18, &(0x7f0000002a40)={&(0x7f0000002740)=@pppoe={0x18, 0x0, {0x1, @multicast, 'gre0\x00'}}, 0x80, &(0x7f0000002840)=[{&(0x7f00000027c0)="bfe4c76f73fad4c136ceabeecbca7f2d6d7c9cb7d7536c779f49adaef05dfd5ccc3bb920f78b83b50a0c99ec2b997da554a3338a6f0a912c00b487a67c4502a1ab5fba2adf0736c7d614feb22ae8eee8dc603918cdf06cc034a91f64163c263d3669aa261a6d1bbdfe2be653c5b9f8b9b34030", 0x73}], 0x1, &(0x7f0000002880)=[{0x68, 0x10e, 0x2, "f3e5c1e8508b2023fc5b242d4f10cb4c413ed6ec894c9d84894424746341d80fad1743ab90ee1dced24f6b15ea687c8c423e1e65292ddaf5e6dffce7a85ce4eeef5241d3f2456a9bda1ba68e1d0856cfc6005dfd1884"}, {0xd8, 0x107, 0x7fff, "342540826ae59639275b44b36c6016cecc1f76377b75c28a1eda0bbeb7bb908d653c320ca625b722ae2bdea73f3e5688e1feea0293e2e86fe94798256ab861b55db9b5af0fa53c2c5b8406821f99c5b87bff7fe86c486e368d6b95802cdbbcccf5bfd420ed0d7aa65d14fb0114f8cc6db5f6f76d418d8c1d39054fc92758623710844fcef63f202e316ecd0e6c39cb48cc12420763fd1feacb1eccbccb1eeb42d1f5ce51b496159835f2d5fe78f2d59934f2cd289c72603721e0997ae9c5c5ed98e956"}, {0x70, 0x1, 0x7, "93ae7b19ea3da1733924843f21df910100fca125547c11c61e97760b562dc3eecd8101d4e784e6d62cd40acd7f7669b0dedaf71e5e4ed0038989b1c20fe8d9405eda64132a58bddb05fac5386d25b34718af1d06cd12a0d758a7fcf701d6b0f3"}], 0x1b0}, 0x8000) r19 = openat$tun(0xffffffffffffff9c, &(0x7f0000002a80), 0x40, 0x0) ioctl$TUNSETTXFILTER(r19, 0x400454d1, &(0x7f0000002ac0)={0x1, 0x3, [@empty, @empty, @broadcast]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000002b00)={0x6}, 0x8) 129.046994ms ago: executing program 2 (id=4983): ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x2, 0x8a, 0x6, 0x0, 0x0, 0x400000000000, 0x80062, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80027, 0x2, @perf_config_ext={0x7fff, 0x100000000}, 0x8, 0x87, 0x7, 0x1, 0x5, 0xffffffb2, 0xe836, 0x0, 0x8, 0x0, 0xfffffffffffffffd}, r0, 0x3, 0xffffffffffffffff, 0xa) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, r1, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000000000000000000000000000000000000000000000000085756483b58de00ef1cf00000000000000"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}) 0s ago: executing program 5 (id=4984): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000023000000000000000000f90018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b706000014000000b7030000000000008500000005000000bca900000000000035090100000000009500000000000000b7020000000a00007baaf8ff00000000b5090000000000007baaf0ff000000002f8200000000000007080000fffdffffbfa400000000000007060000f0ffffff750204000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000005000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000700)=@framed={{0x18, 0x5, 0x0, 0x0, 0x1}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0xfffff000, 0xe, 0x0, &(0x7f0000000300)="882f1242a03c3f98722780b605a7", 0x0, 0x990d, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000300)='\xb7\xccKi\x9cmpq\xcf\xbf)\n\xcaqRK\x9e\xb3#>\xbc\xf6\xdb\xaf\xaf\xce\x1d\xa1\x14\x96\xa3\x1dEH,FKb%s\f$tZ\xf5:\x06\xf4\nm\xfbij\xe9\x9f\xd3fJ\xf9Y\xdcr\xd4\b#a\xc2\x1a\xa6%\x03\x11\x11e}\x0e\x03i\xd2W\xf1a\f\x90*\x1d\xaaJ\xd0W.\xff\x1d\xcf:p\x0e\x03\xc4\x18\xc5(t\xcd/7\xb7\x1a\xbdeKI\xc4F\xad\xcb\xd7\x9c!\xf59\xb4\xc4]\xc1\x03\x00\x99r\xeb\x05\xe8=\x03#\x88\xc0)vm&M\x8f\xc9\xcfdW$\x960\x99\r\xae\xb7\x87\x9c\xff\xdei\xee\xd52\x9e\x12@\x1a\x93$\x93\x9f\x8f\xa1\x8b\x83\xad\v;\xb9\x8e\xf6\r\xed\x9a\xb1\x989\x96\xab!\x83_&\xfe\xe7\x89\xd5\x83\x0e\xcaU\a\x05\xfap\x12R\xe9\xc0\x10\xae\x16\x7f!\xa8[\'\xe2\r[\xa9h\x14\xd5\xe4\x7fn\x03\x00\x00\x00\x00\x00\x00\x00\t') r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f0000000600)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYBLOB="7d492851db4999dfcf087fa319d70b235fbdf8448aa475043ada1790f3"], 0xffdd) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x6, 0x3, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x81, 0x1, 0x14, 0x0, 0x1a17, 0x20a02, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x156, 0x1, @perf_config_ext={0x100000000, 0xfffffffffffffffc}, 0x6008, 0x3ac, 0xe, 0x9, 0xfffffffffffffffc, 0x5, 0xe5, 0x0, 0x80, 0x0, 0x200}, r8, 0xa, 0xffffffffffffffff, 0x1) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) kernel console output (not intermixed with test programs): 77.318776][ T3626] device wg2 entered promiscuous mode [ 78.538298][ T3705] device veth1_macvtap left promiscuous mode [ 79.662367][ T3767] €Â0: renamed from pim6reg1 [ 79.966850][ T3779] syz.1.1000[3779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.966908][ T3779] syz.1.1000[3779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.320466][ T3806] device syzkaller0 entered promiscuous mode [ 80.363498][ T3802] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 81.579430][ T24] audit: type=1400 audit(1773758562.390:149): avc: denied { create } for pid=3931 comm="syz.3.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 82.094221][ T3944] device syzkaller0 entered promiscuous mode [ 85.302226][ T4143] device syzkaller0 entered promiscuous mode [ 85.476588][ T4147] : port 1(ip6gretap0) entered blocking state [ 85.493224][ T4147] : port 1(ip6gretap0) entered disabled state [ 85.503804][ T4147] device ip6gretap0 entered promiscuous mode [ 85.602149][ T4143] device ip6gretap0 left promiscuous mode [ 85.614031][ T4143] : port 1(ip6gretap0) entered disabled state [ 86.674943][ T4214] device wg2 left promiscuous mode [ 87.044592][ T4236] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 87.053673][ T4236] device syzkaller0 entered promiscuous mode [ 88.794457][ T4350] syzkaller1: tun_chr_ioctl cmd 21731 [ 88.804460][ T4350] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 88.855931][ T4356] syzkaller0: mtu less than device minimum [ 89.368579][ T4402] device syzkaller0 entered promiscuous mode [ 90.525731][ T4474] syz.0.1192[4474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.525849][ T4474] syz.0.1192[4474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.394288][ T24] audit: type=1400 audit(1773758573.180:150): avc: denied { create } for pid=4583 comm="syz.3.1227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 92.770467][ T4609] device syzkaller0 left promiscuous mode [ 93.162691][ T4641] device syzkaller0 entered promiscuous mode [ 94.399983][ T4717] device syzkaller0 entered promiscuous mode [ 95.534646][ T4771] device veth1_macvtap left promiscuous mode [ 97.302859][ T4814] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 97.391700][ T4814] device syzkaller0 entered promiscuous mode [ 97.712176][ T4834] device sit0 left promiscuous mode [ 98.346513][ T4866] device syzkaller0 entered promiscuous mode [ 98.897798][ T4887] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.905583][ T4887] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.943253][ T5024] batadv0: tun_chr_ioctl cmd 2147767521 [ 101.584214][ T5057] device syzkaller0 entered promiscuous mode [ 102.028515][ T5070] device veth0_vlan left promiscuous mode [ 102.034812][ T5070] device veth0_vlan entered promiscuous mode [ 102.061720][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.090579][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 102.129105][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.857436][ T5135] device dummy0 entered promiscuous mode [ 103.186307][ T5147] device syzkaller0 entered promiscuous mode [ 103.271675][ T5147] tap0: tun_chr_ioctl cmd 2147767520 [ 103.287869][ T5147] device syzkaller0 left promiscuous mode [ 106.059256][ T5289] device wg2 left promiscuous mode [ 106.124829][ T5286] device wg2 entered promiscuous mode [ 107.700441][ T5398] tun0: tun_chr_ioctl cmd 1074025678 [ 107.705930][ T5398] tun0: group set to 1 [ 108.577852][ T5441] device syzkaller0 entered promiscuous mode [ 109.476055][ T5526] device pim6reg1 entered promiscuous mode [ 110.129445][ T24] audit: type=1400 audit(1773758590.940:151): avc: denied { create } for pid=5600 comm="syz.1.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 110.551176][ T5645] device syzkaller0 entered promiscuous mode [ 112.450161][ T5754] device syzkaller0 entered promiscuous mode [ 112.719126][ T5785] syz.2.1591[5785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.719187][ T5785] syz.2.1591[5785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.515665][ T5853] ref_ctr_offset mismatch. inode: 0x6a6 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 113.644051][ T5859] device syzkaller0 left promiscuous mode [ 114.233661][ T5915] device syzkaller0 entered promiscuous mode [ 114.278541][ T5917] device syzkaller0 entered promiscuous mode [ 115.619097][ T5952] tap0: tun_chr_ioctl cmd 1074025677 [ 115.633566][ T5952] tap0: linktype set to 805 [ 115.736495][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 115.763571][ T5952] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 115.899466][ T5959] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 115.927106][ T5951] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 115.967485][ T5951] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 116.031069][ T5971] tap0: tun_chr_ioctl cmd 1074025677 [ 116.064695][ T5971] tap0: linktype set to 270 [ 116.098696][ T5974] cgroup: fork rejected by pids controller in /syz1 [ 116.220241][ T6088] device syzkaller0 left promiscuous mode [ 116.226104][ T6088] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 116.774677][ T6139] device syzkaller0 entered promiscuous mode [ 116.975691][ T6136] IPv6: pim6reg1: Disabled Multicast RS [ 117.590222][ T6145] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.599165][ T6145] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.606739][ T6145] device bridge_slave_0 entered promiscuous mode [ 117.654140][ T6145] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.673710][ T6145] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.702984][ T6145] device bridge_slave_1 entered promiscuous mode [ 118.179230][ T24] audit: type=1400 audit(1773758598.990:152): avc: denied { create } for pid=6145 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 118.237583][ T24] audit: type=1400 audit(1773758599.020:153): avc: denied { write } for pid=6145 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 118.316437][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 118.342193][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.345660][ T24] audit: type=1400 audit(1773758599.020:154): avc: denied { read } for pid=6145 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 118.468178][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.481927][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.504248][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.511370][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.518887][ T24] audit: type=1400 audit(1773758599.320:155): avc: denied { read } for pid=6212 comm="syz.0.1686" dev="nsfs" ino=4026532297 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 118.541521][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.550196][ T24] audit: type=1400 audit(1773758599.320:156): avc: denied { open } for pid=6212 comm="syz.0.1686" path="net:[4026532297]" dev="nsfs" ino=4026532297 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 118.574217][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.582665][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.589767][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.598028][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.664776][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.676873][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.700163][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.810051][ T6145] device veth0_vlan entered promiscuous mode [ 118.828866][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 118.847365][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.868099][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.896208][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 119.043598][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 119.058780][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 119.126419][ T6145] device veth1_macvtap entered promiscuous mode [ 119.143989][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 119.158744][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 119.190755][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 119.208770][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 119.223700][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 120.013424][ T6265] tap0: tun_chr_ioctl cmd 1074025677 [ 120.035049][ T6265] tap0: linktype set to 805 [ 120.387957][ T296] device bridge_slave_1 left promiscuous mode [ 120.403243][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.490278][ T296] device bridge_slave_0 left promiscuous mode [ 120.535084][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.613933][ T296] device veth1_macvtap left promiscuous mode [ 122.964991][ T6396] device syzkaller0 entered promiscuous mode [ 123.227989][ T6419] -: renamed from syzkaller0 [ 123.430006][ T6452] tap0: tun_chr_ioctl cmd 1074025677 [ 123.450889][ T6452] tap0: linktype set to 769 [ 123.737788][ T6463] device veth0_vlan left promiscuous mode [ 123.779616][ T6463] device veth0_vlan entered promiscuous mode [ 123.869562][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.893292][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.934928][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 124.083625][ T6468] device syzkaller0 entered promiscuous mode [ 124.927166][ T6537] device syzkaller0 entered promiscuous mode [ 125.184881][ T24] audit: type=1400 audit(1773758605.990:157): avc: denied { ioctl } for pid=6546 comm="syz.0.1780" path="cgroup:[4026532286]" dev="nsfs" ino=4026532286 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 126.900848][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 126.928433][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 127.002583][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 129.433420][ T6698] device syzkaller0 entered promiscuous mode [ 130.571264][ T6752] device syzkaller0 entered promiscuous mode [ 132.108434][ T6840] device syzkaller0 entered promiscuous mode [ 132.360245][ T6846] device veth0_vlan left promiscuous mode [ 132.407683][ T6846] device veth0_vlan entered promiscuous mode [ 132.904624][ T6909] device wg2 entered promiscuous mode [ 133.705201][ T6935] device syzkaller0 entered promiscuous mode [ 133.960239][ T6942] tun0: tun_chr_ioctl cmd 1074025677 [ 133.967866][ T6942] tun0: linktype set to 804 [ 135.517663][ T7026] tun0: tun_chr_ioctl cmd 1074025677 [ 135.552497][ T7026] tun0: linktype set to 820 [ 135.691003][ T7029] device syzkaller0 entered promiscuous mode [ 135.732643][ T7029] device syzkaller0 left promiscuous mode [ 136.287358][ T7033] device syzkaller0 entered promiscuous mode [ 137.905349][ T7081] device sit0 entered promiscuous mode [ 138.101811][ T24] audit: type=1400 audit(1773758618.910:158): avc: denied { create } for pid=7087 comm="syz.1.1939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 139.559646][ T24] audit: type=1400 audit(1773758620.370:159): avc: denied { create } for pid=7156 comm="syz.3.1956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 139.615342][ T7160] device veth1_macvtap entered promiscuous mode [ 141.924818][ T7270] device syzkaller0 entered promiscuous mode [ 142.177474][ T24] audit: type=1400 audit(1773758622.980:160): avc: denied { create } for pid=7284 comm="syz.4.1998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 143.417860][ T7328] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.359859][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 144.374652][ T7371] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 144.388949][ T7367] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 144.414202][ T7367] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 145.183440][ T7437] device syzkaller0 entered promiscuous mode [ 145.387260][ T7438] device wg2 entered promiscuous mode [ 145.605079][ T7466] device syzkaller0 left promiscuous mode [ 146.124568][ T7492] device syzkaller0 entered promiscuous mode [ 146.546974][ T7532] device bridge0 entered promiscuous mode [ 146.610467][ T7534] device syzkaller0 entered promiscuous mode [ 146.661226][ T7532] geneve1: tun_chr_ioctl cmd 1074025672 [ 146.666818][ T7532] geneve1: ignored: set checksum enabled [ 148.193701][ T7668] device syzkaller0 entered promiscuous mode [ 148.790139][ T24] audit: type=1400 audit(1773758629.600:161): avc: denied { create } for pid=7698 comm="syz.2.2108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 148.896757][ T7715] device syzkaller0 entered promiscuous mode [ 150.125662][ T7771] device syzkaller0 entered promiscuous mode [ 150.530924][ T7789] device wg2 entered promiscuous mode [ 150.553425][ T7793] device syzkaller0 entered promiscuous mode [ 150.563213][ T7792] tun0: tun_chr_ioctl cmd 2147767506 [ 151.453429][ T7833] device veth0_vlan left promiscuous mode [ 151.469409][ T7833] device veth0_vlan entered promiscuous mode [ 151.476832][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.495502][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.516371][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.602916][ T7840] bridge0: port 3(veth1) entered blocking state [ 151.642158][ T7840] bridge0: port 3(veth1) entered disabled state [ 151.661789][ T7840] device veth1 entered promiscuous mode [ 151.685561][ T7840] bridge0: port 3(veth1) entered blocking state [ 151.691907][ T7840] bridge0: port 3(veth1) entered listening state [ 151.721346][ T7845] @ÿ: renamed from bond_slave_0 [ 152.468453][ T7890] device macsec0 entered promiscuous mode [ 152.574704][ T24] audit: type=1400 audit(1773758633.380:162): avc: denied { create } for pid=7892 comm="syz.4.2162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 153.294587][ T7938] device wg2 left promiscuous mode [ 153.345449][ T7942] device wg2 entered promiscuous mode [ 154.409272][ T8001] device syzkaller0 entered promiscuous mode [ 154.848535][ T8047] device syzkaller0 entered promiscuous mode [ 154.883328][ T8046] device syzkaller0 entered promiscuous mode [ 155.820167][ T8088] device macsec0 left promiscuous mode [ 158.089653][ T24] audit: type=1400 audit(1773758638.900:163): avc: denied { create } for pid=8200 comm="syz.1.2255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 159.467288][ T8264] device syzkaller0 entered promiscuous mode [ 160.351518][ T8297] device sit0 left promiscuous mode [ 160.559214][ T8320] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.566389][ T8320] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.574073][ T8320] device bridge0 left promiscuous mode [ 160.613026][ T8320] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.620135][ T8320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.627447][ T8320] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.634526][ T8320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.648843][ T8320] device bridge0 entered promiscuous mode [ 161.695539][ T8415] device syzkaller0 entered promiscuous mode [ 161.827724][ T8421] sit0: mtu greater than device maximum [ 162.539238][ T24] audit: type=1400 audit(1773758643.350:164): avc: denied { create } for pid=8483 comm="syz.4.2338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 162.632828][ T24] audit: type=1400 audit(1773758643.420:165): avc: denied { create } for pid=8495 comm="syz.1.2342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 163.099548][ T8549] device syzkaller0 entered promiscuous mode [ 163.409633][ T8565] device syzkaller0 left promiscuous mode [ 163.952754][ T8604] tap0: tun_chr_ioctl cmd 1074025677 [ 163.992663][ T8604] tap0: linktype set to 3 [ 164.383362][ T8581] device syzkaller0 entered promiscuous mode [ 165.783635][ T8720] device syzkaller0 entered promiscuous mode [ 165.811649][ T8726] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.818946][ T8726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.826271][ T8726] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.833342][ T8726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.841228][ T8726] device bridge0 entered promiscuous mode [ 165.876147][ T8736] device syzkaller0 entered promiscuous mode [ 165.931395][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.045849][ T8756] device veth0_vlan left promiscuous mode [ 166.061523][ T8756] device veth0_vlan entered promiscuous mode [ 166.101328][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.110592][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.118495][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.758730][ T8789] device syzkaller0 entered promiscuous mode [ 166.836016][ T8789] erspan0: refused to change device tx_queue_len [ 167.148232][ T8809] device veth0_vlan left promiscuous mode [ 167.215951][ T8809] device veth0_vlan entered promiscuous mode [ 167.921251][ T8845] bridge0: port 3(gretap0) entered blocking state [ 167.938712][ T8845] bridge0: port 3(gretap0) entered disabled state [ 167.995969][ T8845] device gretap0 entered promiscuous mode [ 168.014032][ T8845] bridge0: port 3(gretap0) entered blocking state [ 168.020630][ T8845] bridge0: port 3(gretap0) entered forwarding state [ 168.278295][ T8887] device syzkaller0 entered promiscuous mode [ 168.527555][ T8901] device syzkaller0 entered promiscuous mode [ 169.307773][ T8985] device syzkaller0 entered promiscuous mode [ 170.280447][ T9075] device syzkaller0 entered promiscuous mode [ 171.099301][ T9119] device syzkaller0 entered promiscuous mode [ 171.866972][ T9162] device syzkaller0 entered promiscuous mode [ 171.874521][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 172.676209][ T9208] device syzkaller0 entered promiscuous mode [ 172.698180][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 172.933698][ T9214] device syzkaller0 entered promiscuous mode [ 173.379073][ T9221] device syzkaller0 entered promiscuous mode [ 173.715379][ T9234] device pim6reg1 entered promiscuous mode [ 176.137199][ T9305] device syzkaller0 entered promiscuous mode [ 176.964405][ T9337] device syzkaller0 entered promiscuous mode [ 177.328833][ T9350] device syzkaller0 entered promiscuous mode [ 178.157172][ T9391] device syzkaller0 entered promiscuous mode [ 181.569252][ T9586] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 181.596772][ T9586] device syzkaller0 entered promiscuous mode [ 181.797642][ C1] bridge0: port 3(veth1) entered learning state [ 183.075394][ T9692] device lo entered promiscuous mode [ 183.116978][ T9692] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 183.422954][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 183.457728][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 183.540679][ T9729] device syzkaller0 entered promiscuous mode [ 183.611283][ T9724] device syzkaller0 entered promiscuous mode [ 184.033892][ T9741] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 186.068596][ T9877] device syzkaller0 entered promiscuous mode [ 186.159973][ T9882] device syzkaller0 entered promiscuous mode [ 186.560721][ T9905] device syzkaller0 left promiscuous mode [ 186.986056][ T9918] device wg2 left promiscuous mode [ 187.089797][ T9924] device wg2 entered promiscuous mode [ 187.135454][ T9926] device syzkaller0 entered promiscuous mode [ 188.357536][ T9989] lo: mtu less than device minimum [ 189.026581][T10018] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.034409][T10018] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.042311][T10018] device bridge_slave_0 entered promiscuous mode [ 189.051036][T10018] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.058325][T10018] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.065890][T10018] device bridge_slave_1 entered promiscuous mode [ 189.155951][T10018] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.163174][T10018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.170507][T10018] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.177572][T10018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.289382][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.297107][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.305862][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.333699][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.343676][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.357102][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.365564][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.501277][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 189.543492][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 189.555697][T10064] device dummy0 entered promiscuous mode [ 189.580990][T10058] device syzkaller0 entered promiscuous mode [ 189.607699][T10018] device veth0_vlan entered promiscuous mode [ 189.631885][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 189.642813][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.673782][T10018] device veth1_macvtap entered promiscuous mode [ 189.681023][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.689370][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.697026][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.705663][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.714162][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.783841][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.793175][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.865636][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.874105][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.516823][T10125] device aaaaaaaaaaaaaaa entered promiscuous mode [ 190.639216][T10131] device syzkaller0 entered promiscuous mode [ 190.850683][ T9] device veth1 left promiscuous mode [ 190.856067][ T9] bridge0: port 3(veth1) entered disabled state [ 190.863549][ T9] device bridge_slave_1 left promiscuous mode [ 190.869738][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.877799][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.887113][ T9] device veth0_vlan left promiscuous mode [ 191.830683][T10167] device syzkaller0 entered promiscuous mode [ 192.775053][T10208] device syzkaller0 entered promiscuous mode [ 192.804979][T10195] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.813205][T10195] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.831926][T10195] device bridge_slave_0 entered promiscuous mode [ 192.843140][T10195] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.850594][T10195] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.858576][T10195] device bridge_slave_1 entered promiscuous mode [ 193.255143][T10195] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.262329][T10195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.270247][T10195] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.277412][T10195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.398407][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.479047][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.495366][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.565563][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.593409][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.600520][ T340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.608350][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.616811][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.623902][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.682262][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.701298][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.898382][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.917863][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.969735][T10195] device veth0_vlan entered promiscuous mode [ 194.011947][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 194.030758][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.084127][T10195] device veth1_macvtap entered promiscuous mode [ 194.099521][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.108283][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.116501][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 194.125254][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 194.133718][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 194.197155][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 194.208923][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 194.218427][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 194.228691][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 195.249750][ T9] device bridge_slave_1 left promiscuous mode [ 195.300892][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.357971][ T9] device bridge_slave_0 left promiscuous mode [ 195.364319][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.594320][ T24] audit: type=1400 audit(1773758676.400:166): avc: denied { ioctl } for pid=10288 comm="syz.0.2863" path="" dev="cgroup2" ino=129 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 195.709416][T10297] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 197.069426][T10371] device syzkaller0 entered promiscuous mode [ 197.101512][T10371] syzkaller0: tun_net_xmit 1280 [ 197.111955][T10371] syzkaller0: create flow: hash 2593688132 index 2 [ 197.136309][T10369] device wg2 left promiscuous mode [ 197.185483][T10370] syzkaller0: delete flow: hash 2593688132 index 2 [ 197.574127][T10383] device syzkaller0 entered promiscuous mode [ 198.725608][T10440] device syzkaller0 entered promiscuous mode [ 198.844915][T10443] tap0: tun_chr_ioctl cmd 1074025680 [ 198.964881][T10444] tap0: tun_chr_ioctl cmd 1074275332 [ 199.541041][T10466] device syzkaller0 entered promiscuous mode [ 200.129226][T10487] device xfrm0 entered promiscuous mode [ 201.561181][ T24] audit: type=1400 audit(1773758682.370:167): avc: denied { create } for pid=10563 comm="syz.1.2950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 203.925873][T10750] device syzkaller0 entered promiscuous mode [ 204.160457][ T24] audit: type=1400 audit(1773758684.970:168): avc: denied { setattr } for pid=10786 comm="syz.1.3014" path="/dev/net/tun" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 205.122152][ T24] audit: type=1400 audit(1773758685.930:169): avc: denied { mounton } for pid=10848 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 205.465480][T10868] bridge0: port 3(veth0_to_bridge) entered blocking state [ 205.472686][T10868] bridge0: port 3(veth0_to_bridge) entered disabled state [ 205.480872][T10868] device veth0_to_bridge entered promiscuous mode [ 205.488055][T10868] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.501637][T10868] bridge0: port 3(veth0_to_bridge) entered blocking state [ 205.508798][T10868] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 205.516664][T10848] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.534113][T10848] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.541792][T10848] device bridge_slave_0 entered promiscuous mode [ 205.549647][T10848] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.556692][T10848] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.564263][T10848] device bridge_slave_1 entered promiscuous mode [ 206.114712][T10848] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.121824][T10848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.129129][T10848] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.136434][T10848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.168656][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.176849][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.186415][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.239935][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.254320][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.276488][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.296424][T10848] device veth0_vlan entered promiscuous mode [ 206.313618][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.322436][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.381021][T10848] device veth1_macvtap entered promiscuous mode [ 206.457561][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.481357][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.551711][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.612313][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.629564][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.646022][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.654346][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.663103][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.672303][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.725816][ T24] audit: type=1400 audit(1773758687.530:170): avc: denied { unmount } for pid=10848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 206.746858][ T9] bridge0: port 3(gretap0) entered disabled state [ 206.805901][ T9] device gretap0 left promiscuous mode [ 206.908735][ T9] bridge0: port 3(gretap0) entered disabled state [ 207.195321][ T9] device bridge_slave_1 left promiscuous mode [ 207.208492][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.229014][ T9] device bridge_slave_0 left promiscuous mode [ 207.253169][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.577723][T10924] device syzkaller0 entered promiscuous mode [ 207.893707][T10947] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 207.918520][T10947] syzkaller0: linktype set to 825 [ 208.175729][ T24] audit: type=1400 audit(1773758688.970:171): avc: denied { create } for pid=10971 comm="syz.4.3070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 208.908469][T11004] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 209.214205][T11012] device wg2 entered promiscuous mode [ 209.753075][T11040] ªªªªªª™™: renamed from vlan0 [ 209.927773][T11038] device syzkaller0 entered promiscuous mode [ 210.080430][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 210.092596][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 210.105224][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 210.117252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 210.129347][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 210.141881][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 210.154005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 210.166177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 210.178264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 210.190277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 210.373711][T11082] device syzkaller0 entered promiscuous mode [ 212.734375][T11141] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.746666][T11141] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.768838][T11141] device bridge_slave_0 entered promiscuous mode [ 212.807628][T11141] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.814701][T11141] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.975336][T11141] device bridge_slave_1 entered promiscuous mode [ 215.088356][ C1] net_ratelimit: 94267 callbacks suppressed [ 215.088382][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 215.107653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 215.127574][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 215.146799][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 215.160047][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 215.173788][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 215.189521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 215.204437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 215.218609][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 215.235969][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 215.797693][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.805219][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.029882][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.041672][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.187908][ T1975] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.195062][ T1975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.238471][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.302724][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.339426][ T1975] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.346593][ T1975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.366014][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.382991][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.547621][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.555449][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.576182][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.737909][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.746935][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.938528][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 216.959358][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.054590][T11141] device veth0_vlan entered promiscuous mode [ 217.071360][T11141] device veth1_macvtap entered promiscuous mode [ 217.287799][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.304875][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.359635][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.416437][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.518457][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 217.558212][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.594276][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.607249][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.615899][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.097510][ C1] net_ratelimit: 135722 callbacks suppressed [ 220.097524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 220.116014][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 220.128035][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 220.140107][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 220.152177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 220.164334][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 220.176316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 220.188397][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 220.200392][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 220.212460][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 220.880790][T11327] device syzkaller0 entered promiscuous mode [ 220.925441][ T24] audit: type=1400 audit(1773758701.720:172): avc: denied { create } for pid=11331 comm="syz.2.3167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 221.669538][T11354] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 221.702068][T11354] device syzkaller0 entered promiscuous mode [ 222.339142][T11375] device syzkaller0 entered promiscuous mode [ 223.432801][ T9] device macsec0 left promiscuous mode [ 223.497694][ T9] nr0: port 1(macsec0) entered disabled state [ 223.632842][ T9] device bridge_slave_1 left promiscuous mode [ 223.784237][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.892290][ T9] device bridge_slave_0 left promiscuous mode [ 223.957258][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.061196][ T9] device veth0_vlan left promiscuous mode [ 225.107499][ C1] net_ratelimit: 162345 callbacks suppressed [ 225.107513][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 225.125561][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 225.137649][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 225.150008][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 225.162256][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 225.175086][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 225.187176][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 225.199175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 225.211243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 225.223236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 226.817985][T11454] device syzkaller0 entered promiscuous mode [ 227.211935][T11462] device syzkaller0 entered promiscuous mode [ 230.117493][ C1] net_ratelimit: 148183 callbacks suppressed [ 230.117508][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 230.135781][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 230.147900][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 230.160369][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 230.172482][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 230.184597][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 230.197101][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 230.211354][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 230.227527][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 230.239622][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 231.237180][T11578] device syzkaller0 entered promiscuous mode [ 231.421501][T11578] device syzkaller0 left promiscuous mode [ 234.537161][T11650] device syzkaller0 entered promiscuous mode [ 234.850370][T11679] bridge0: port 3(veth0_vlan) entered blocking state [ 234.878794][T11679] bridge0: port 3(veth0_vlan) entered disabled state [ 234.886156][T11679] bridge0: port 3(veth0_vlan) entered blocking state [ 234.892894][T11679] bridge0: port 3(veth0_vlan) entered forwarding state [ 235.127516][ C1] net_ratelimit: 113568 callbacks suppressed [ 235.127531][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 235.145721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 235.157728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 235.169931][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 235.181941][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 235.194016][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 235.206025][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 235.218144][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 235.230146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 235.242221][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 235.282148][T11699] device syzkaller0 entered promiscuous mode [ 236.522436][T11755] device syzkaller0 entered promiscuous mode [ 236.628165][T11765] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.638164][T11765] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.106775][T11793] device pim6reg1 entered promiscuous mode [ 240.137517][ C1] net_ratelimit: 124916 callbacks suppressed [ 240.137531][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 240.155681][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 240.167831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 240.180090][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 240.192105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 240.204159][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 240.216139][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 240.228206][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 240.240290][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 240.252456][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 242.351533][T11971] device syzkaller0 entered promiscuous mode [ 242.984657][T11994] device veth0 entered promiscuous mode [ 243.896743][T12034] bridge0: port 3(veth0_vlan) entered disabled state [ 245.147509][ C1] net_ratelimit: 152684 callbacks suppressed [ 245.147524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 245.165828][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 245.177880][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 245.189952][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 245.202325][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 245.214635][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 245.226636][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 245.238724][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 245.250885][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 245.263051][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 248.148978][T12170] device syzkaller0 entered promiscuous mode [ 250.157495][ C1] net_ratelimit: 146147 callbacks suppressed [ 250.157510][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 250.175642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 250.187690][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 250.199856][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 250.211923][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 250.224003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 250.236138][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 250.248280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 250.260368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 250.272434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 255.167516][ C1] net_ratelimit: 79392 callbacks suppressed [ 255.167530][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 255.185785][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 255.197937][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 255.209991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 255.222145][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 255.234454][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 255.246518][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 255.258714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 255.270796][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 255.282987][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 258.205975][T12476] device wg2 left promiscuous mode [ 260.177485][ C1] net_ratelimit: 95282 callbacks suppressed [ 260.177498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 260.195570][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 260.207687][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 260.219756][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 260.231799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 260.243909][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 260.255948][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 260.268068][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 260.280173][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 260.292361][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 260.641053][T12576] device syzkaller0 entered promiscuous mode [ 260.650257][ T3856] syzkaller0: tun_net_xmit 48 [ 260.662314][T12579] syzkaller0: create flow: hash 2329926511 index 2 [ 260.926928][T12576] syzkaller0: delete flow: hash 2329926511 index 2 [ 263.328933][ T24] audit: type=1400 audit(1773758744.140:173): avc: denied { create } for pid=12698 comm="syz.4.3545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 265.187463][ C1] net_ratelimit: 100931 callbacks suppressed [ 265.187476][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 265.205778][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 265.218254][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 265.230319][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 265.242566][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 265.254658][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 265.266708][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 265.278770][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 265.290885][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 265.302970][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 266.914886][T12837] @ÿ: renamed from bond_slave_0 [ 267.471425][T12886] device syzkaller0 entered promiscuous mode [ 267.506858][T12888] -: renamed from syzkaller0 [ 267.756039][T12908] device syzkaller0 entered promiscuous mode [ 268.992586][T12949] device syzkaller0 entered promiscuous mode [ 269.812235][T12975] device veth0_vlan left promiscuous mode [ 269.960538][T12975] device veth0_vlan entered promiscuous mode [ 270.197602][ C1] net_ratelimit: 74466 callbacks suppressed [ 270.197620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 270.215986][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 270.228000][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 270.240195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 270.252434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 270.264525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 270.276827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 270.288960][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 270.300961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 270.313055][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 271.131193][T13023] device wg2 entered promiscuous mode [ 271.831899][T13094] device wg2 entered promiscuous mode [ 272.238558][T13119] device syzkaller0 entered promiscuous mode [ 272.748733][T13139] device syzkaller0 entered promiscuous mode [ 274.516147][T13195] nr0: port 1(macsec0) entered blocking state [ 274.549055][T13195] nr0: port 1(macsec0) entered disabled state [ 274.573795][T13195] device macsec0 entered promiscuous mode [ 274.708893][T13205] IPv6: pim6reg1: Disabled Multicast RS [ 274.821470][T13207] bridge0: port 3(gretap0) entered blocking state [ 274.828379][T13207] bridge0: port 3(gretap0) entered disabled state [ 274.864646][T13207] device gretap0 entered promiscuous mode [ 275.207496][ C1] net_ratelimit: 69406 callbacks suppressed [ 275.207513][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 275.227908][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 275.240881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 275.252956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 275.265624][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 275.277752][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 275.289866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 275.301928][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 275.314044][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 275.326206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 280.217649][ C1] net_ratelimit: 61356 callbacks suppressed [ 280.217663][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 280.235747][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 280.247840][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 280.259903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 280.272129][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.284302][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 280.296581][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 280.308700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 280.321667][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 280.333749][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 281.740569][T13387] device wg2 entered promiscuous mode [ 285.070553][T13487] device veth1_macvtap left promiscuous mode [ 285.227549][ C1] net_ratelimit: 65318 callbacks suppressed [ 285.227563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 285.245624][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 285.257621][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 285.269723][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 285.281891][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 285.293968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 285.306282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 285.318439][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 285.330446][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 285.342902][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 285.346490][T13490] device veth1_macvtap entered promiscuous mode [ 285.400396][T13490] device macsec0 entered promiscuous mode [ 285.604848][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 287.330047][T13528] device wg2 left promiscuous mode [ 289.330920][T13595] Ÿë: port 1(veth0_to_team) entered blocking state [ 289.365527][T13595] Ÿë: port 1(veth0_to_team) entered disabled state [ 289.444756][T13595] device veth0_to_team entered promiscuous mode [ 290.237593][ C1] net_ratelimit: 74276 callbacks suppressed [ 290.237609][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 290.256258][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 290.268420][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 290.280482][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 290.292586][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 290.304665][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 290.317134][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 290.329347][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 290.341523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 290.353797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 291.125101][T13632] device syzkaller0 entered promiscuous mode [ 292.056498][T13638] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.118696][T13638] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.199123][T13638] device bridge_slave_0 entered promiscuous mode [ 292.314766][T13638] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.327371][T13638] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.372349][T13638] device bridge_slave_1 entered promiscuous mode [ 293.072496][T13638] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.079686][T13638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.151807][ T1975] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.421847][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.439992][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.487696][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.531626][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.571844][ T1975] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.579233][ T1975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.666865][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.718042][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.762837][ T1975] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.769955][ T1975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.800068][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.818478][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.836745][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.856155][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.988945][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 293.997967][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.009118][T13638] device veth0_vlan entered promiscuous mode [ 294.117702][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 294.177740][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.229485][T13710] device syzkaller0 entered promiscuous mode [ 294.269284][T13638] device veth1_macvtap entered promiscuous mode [ 294.280317][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.355046][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.370906][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.419823][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.501453][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.574339][T13711] device syzkaller0 left promiscuous mode [ 294.676037][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.755755][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.888359][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 295.018856][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 295.247466][ C1] net_ratelimit: 72954 callbacks suppressed [ 295.247481][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 295.265581][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 295.277874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 295.290017][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 295.302134][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 295.314190][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 295.326278][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 295.338395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 295.350601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 295.362806][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 299.462338][T13827] device veth1_macvtap left promiscuous mode [ 299.789229][T13860] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.796416][T13860] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.968944][T13861] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.976077][T13861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.983389][T13861] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.990450][T13861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.103363][T13861] device bridge0 entered promiscuous mode [ 300.257995][ C1] net_ratelimit: 63028 callbacks suppressed [ 300.264081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 300.278013][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 300.290447][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 300.305553][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 300.321655][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 300.335946][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 300.353717][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 300.369481][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 300.383538][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 300.396107][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 300.920278][T13881] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.927535][T13881] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.267459][ C1] net_ratelimit: 59794 callbacks suppressed [ 305.267474][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 305.286312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 305.298660][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 305.311099][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 305.323794][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 305.336047][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 305.348049][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 305.360139][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 305.372322][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 305.384366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 309.531555][T14165] device syzkaller0 entered promiscuous mode [ 310.278023][ C1] net_ratelimit: 66371 callbacks suppressed [ 310.278048][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 310.298412][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 310.315590][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 310.328650][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 310.342637][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 310.357501][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 310.371210][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 310.386456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 310.402341][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 310.416449][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 310.651909][T14199] cgroup: fork rejected by pids controller in /syz5 [ 311.222225][T14205] bridge0: port 3(gretap0) entered blocking state [ 311.229211][T14205] bridge0: port 3(gretap0) entered forwarding state [ 311.236983][T14205] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.244440][T14205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.252530][T14205] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.259988][T14205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.315003][T14205] device bridge0 entered promiscuous mode [ 312.277523][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.452497][T14341] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.460716][T14341] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.524501][T14341] device bridge_slave_0 entered promiscuous mode [ 313.657084][T14341] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.670836][T14341] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.708810][T14341] device bridge_slave_1 entered promiscuous mode [ 314.008262][T14362] device syzkaller0 entered promiscuous mode [ 314.162982][T14341] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.170096][T14341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.247523][T14384] tun0: tun_chr_ioctl cmd 1074025673 [ 314.313470][T14386] tun0: tun_chr_ioctl cmd 1074025678 [ 314.325471][T14386] tun0: group set to 1 [ 314.377009][T14388] device syzkaller0 entered promiscuous mode [ 314.418306][ T1975] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.435400][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 314.460861][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.564050][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.579074][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.605052][ T1975] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.612259][ T1975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.655030][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.682559][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.713708][ T1975] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.720999][ T1975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.791820][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 314.864113][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.894407][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 314.930898][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.057910][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 315.115796][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 315.155563][T14341] device veth0_vlan entered promiscuous mode [ 315.199462][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 315.248348][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.287499][ C1] net_ratelimit: 71071 callbacks suppressed [ 315.287515][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 315.305593][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 315.317642][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 315.330194][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 315.342498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 315.354533][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 315.355041][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.367027][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 315.386196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 315.398265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 315.410625][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 315.524492][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.563382][T14341] device veth1_macvtap entered promiscuous mode [ 315.698302][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 315.713187][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 315.765677][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 315.845497][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 315.868470][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.975080][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 316.017795][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 316.689160][T14463] bridge0: port 3(veth1) entered blocking state [ 316.715234][T14463] bridge0: port 3(veth1) entered disabled state [ 316.773914][T14463] device veth1 entered promiscuous mode [ 316.814537][T14463] bridge0: port 3(veth1) entered blocking state [ 316.820880][T14463] bridge0: port 3(veth1) entered forwarding state [ 316.905538][T14464] device veth1 left promiscuous mode [ 316.923278][T14464] bridge0: port 3(veth1) entered disabled state [ 317.874448][T14536] device syzkaller0 entered promiscuous mode [ 317.960598][ T9] device bridge_slave_1 left promiscuous mode [ 317.968520][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.992941][ T9] device bridge_slave_0 left promiscuous mode [ 318.002659][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.032289][ T9] device veth1_macvtap left promiscuous mode [ 318.056756][ T9] device veth0_vlan left promiscuous mode [ 318.968204][T14577] device wg2 entered promiscuous mode [ 319.385872][T14595] +: renamed from team_slave_1 [ 320.297638][ C1] net_ratelimit: 75005 callbacks suppressed [ 320.297652][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 320.315750][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 320.327793][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 320.340078][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 320.352190][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 320.364621][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 320.377026][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 320.389143][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 320.401136][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 320.413173][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 320.456328][T14608] device syzkaller0 entered promiscuous mode [ 321.918193][T14638] device syzkaller0 entered promiscuous mode [ 323.716666][T14676] device wg2 left promiscuous mode [ 323.880967][T14684] device wg2 entered promiscuous mode [ 325.307497][ C1] net_ratelimit: 49445 callbacks suppressed [ 325.307511][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 325.325609][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 325.337699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 325.350265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 325.362700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 325.378015][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 325.390256][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 325.402408][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 325.414511][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 325.426876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 325.840158][T14752] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.155196][T14769] device syzkaller0 entered promiscuous mode [ 327.131564][T14820] device syzkaller0 entered promiscuous mode [ 328.033624][T14860] device syzkaller0 entered promiscuous mode [ 328.344873][T14867] device wg2 left promiscuous mode [ 329.975730][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.989327][ T1975] bridge0: port 3(veth0_vlan) entered blocking state [ 329.996073][ T1975] bridge0: port 3(veth0_vlan) entered forwarding state [ 330.067907][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 330.099959][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 330.266102][T14946] device syzkaller0 entered promiscuous mode [ 330.317571][ C1] net_ratelimit: 70085 callbacks suppressed [ 330.317587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 330.335691][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 330.347811][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 330.360038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 330.372143][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 330.386474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 330.398890][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 330.415225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 330.428172][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 330.440262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 335.294280][T15063] device syzkaller0 entered promiscuous mode [ 335.327571][ C1] net_ratelimit: 68774 callbacks suppressed [ 335.327586][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 335.346092][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 335.358210][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 335.370828][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 335.382947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 335.395406][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 335.408513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 335.420838][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 335.432848][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 335.445286][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 337.676493][T15145] device syzkaller0 entered promiscuous mode [ 337.702838][T15145] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 339.068535][T15199] tap0: tun_chr_ioctl cmd 2147767520 [ 340.337433][ C1] net_ratelimit: 74730 callbacks suppressed [ 340.337448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 340.355457][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 340.367578][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 340.379660][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 340.392508][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 340.404702][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 340.416805][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 340.429171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 340.441437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 340.453773][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 345.007237][T15315] device syzkaller0 entered promiscuous mode [ 345.347437][ C1] net_ratelimit: 64163 callbacks suppressed [ 345.347452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 345.366113][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 345.378252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 345.390428][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 345.402508][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 345.414745][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 345.426922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 345.443059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 345.462648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 345.483367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 349.060203][T15427] device syzkaller0 entered promiscuous mode [ 350.357457][ C1] net_ratelimit: 49042 callbacks suppressed [ 350.357470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 350.375663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 350.387793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 350.399932][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.412064][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 350.424733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 350.436857][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 350.448870][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 350.460943][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 350.473060][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.367459][ C1] net_ratelimit: 52085 callbacks suppressed [ 355.367474][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.385778][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 355.398135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 355.410437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 355.422713][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 355.434801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 355.446936][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.459010][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 355.471358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 355.484105][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 355.991179][T15581] device wg2 left promiscuous mode [ 356.408166][T15581] device wg2 entered promiscuous mode [ 359.909742][T15715] device syzkaller0 entered promiscuous mode [ 360.377555][ C1] net_ratelimit: 68374 callbacks suppressed [ 360.377569][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 360.396175][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 360.408359][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 360.420993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 360.433195][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.445449][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 360.457835][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 360.470152][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 360.482168][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 360.494248][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 360.753336][T15740] device pim6reg1 entered promiscuous mode [ 361.132750][T15749] device syzkaller0 entered promiscuous mode [ 362.337019][T15783] device syzkaller0 entered promiscuous mode [ 364.082946][T15836] device veth0_vlan left promiscuous mode [ 364.166494][T15836] device veth0_vlan entered promiscuous mode [ 364.341526][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.372590][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 364.455818][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 365.387473][ C1] net_ratelimit: 74777 callbacks suppressed [ 365.387488][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 365.405993][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.418064][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 365.430580][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 365.442679][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 365.454797][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 365.467163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 365.479304][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.491341][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 365.503521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 366.092391][T15874] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.348273][T15878] device bridge_slave_1 left promiscuous mode [ 366.369176][T15878] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.389246][T15878] device bridge_slave_0 left promiscuous mode [ 366.404403][T15878] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.263331][T15981] device veth0_vlan left promiscuous mode [ 369.305374][T15981] device veth0_vlan entered promiscuous mode [ 369.415936][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.424754][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.435111][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 370.397438][ C1] net_ratelimit: 67007 callbacks suppressed [ 370.397452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 370.415876][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 370.427896][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 370.439985][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 370.452107][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 370.466951][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 370.479230][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 370.491456][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 370.503448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 370.515538][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 372.433343][T16081] device syzkaller0 entered promiscuous mode [ 375.407455][ C1] net_ratelimit: 61980 callbacks suppressed [ 375.407469][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 375.425688][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 375.438030][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 375.450173][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 375.462224][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 375.474292][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 375.486557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 375.498695][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 375.510871][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 375.522930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 379.757693][T16372] +: renamed from team_slave_1 [ 380.417485][ C1] net_ratelimit: 67336 callbacks suppressed [ 380.417500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 380.435518][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 380.447511][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 380.459556][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 380.471648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.483659][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.495706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 380.507936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 380.520105][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 380.532196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 380.593936][T16400] device syzkaller0 entered promiscuous mode [ 380.755071][ T24] audit: type=1400 audit(1773758861.560:174): avc: denied { create } for pid=16408 comm="syz.0.4544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 380.912452][T16418] device syzkaller0 entered promiscuous mode [ 381.486376][T16454] device veth0_vlan left promiscuous mode [ 381.598857][T16454] device veth0_vlan entered promiscuous mode [ 381.794225][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 381.841969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.969372][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.242751][T16464] device syzkaller0 entered promiscuous mode [ 382.412769][T16482] device syzkaller0 entered promiscuous mode [ 383.264958][T16506] ÿ: renamed from team_slave_1 [ 384.280964][T16520] device veth1_macvtap left promiscuous mode [ 384.287065][T16520] device macsec0 left promiscuous mode [ 384.355381][T16523] device veth1_macvtap entered promiscuous mode [ 384.366293][T16523] device macsec0 entered promiscuous mode [ 384.515964][T16527] bridge0: port 3(gretap0) entered disabled state [ 384.522886][T16527] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.530583][T16527] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.594564][T16527] device bridge0 left promiscuous mode [ 385.427530][ C1] net_ratelimit: 80779 callbacks suppressed [ 385.427545][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 385.445720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 385.457780][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 385.469948][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 385.482017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 385.494305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 385.506557][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.518716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.530754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 385.543038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 386.408698][T16588] device syzkaller0 entered promiscuous mode [ 387.711850][T16606] device syzkaller0 entered promiscuous mode [ 390.402292][T16663] device wg2 entered promiscuous mode [ 390.431841][T16676] device pim6reg1 entered promiscuous mode [ 390.438112][ C1] net_ratelimit: 79451 callbacks suppressed [ 390.438154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 390.456696][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 390.469109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 390.482171][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 390.495042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 390.507909][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 390.520591][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 390.533280][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 390.545857][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 390.559519][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 393.415427][T16774] device veth0_vlan left promiscuous mode [ 393.478125][T16774] device veth0_vlan entered promiscuous mode [ 393.870988][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.885811][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 393.915396][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 395.237053][T16843] device sit0 entered promiscuous mode [ 395.447439][ C1] net_ratelimit: 61302 callbacks suppressed [ 395.447453][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 395.465788][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 395.477909][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 395.489983][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 395.501995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 395.514018][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 395.526304][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 395.538520][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 395.550624][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 395.562925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 397.474672][T16885] device wg2 entered promiscuous mode [ 397.659520][T16889] device syzkaller0 entered promiscuous mode [ 397.867794][T16907] device sit0 entered promiscuous mode [ 399.081305][T16954] device syzkaller0 entered promiscuous mode [ 399.098179][T16958] €Â0: renamed from pim6reg1 [ 400.457521][ C1] net_ratelimit: 70066 callbacks suppressed [ 400.457538][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 400.475857][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 400.487986][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 400.500063][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 400.512228][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 400.524471][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 400.536751][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 400.548890][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 400.560936][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 400.572985][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 401.208977][T17012] device syzkaller0 entered promiscuous mode [ 402.420794][T17055] device syzkaller0 entered promiscuous mode [ 402.914061][T17088] device syzkaller0 entered promiscuous mode [ 403.816940][T17129] device syzkaller0 entered promiscuous mode [ 405.467472][ C1] net_ratelimit: 74290 callbacks suppressed [ 405.467488][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 405.485667][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 405.497782][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 405.509788][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 405.522365][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 405.534564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 405.547447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 405.561167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 405.573216][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 405.585368][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 405.912179][T17207] device wg2 left promiscuous mode [ 410.477444][ C1] net_ratelimit: 83928 callbacks suppressed [ 410.477459][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 410.495446][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 410.507723][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 410.520148][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 410.532231][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 410.544329][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 410.556662][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 410.568730][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 410.580972][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 410.593086][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.126120][T17369] device veth0_vlan left promiscuous mode [ 412.132300][T17369] device veth0_vlan entered promiscuous mode [ 412.525733][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.583792][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 412.642795][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.265340][T17443] device syzkaller0 entered promiscuous mode [ 415.487419][ C1] net_ratelimit: 66562 callbacks suppressed [ 415.487432][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 415.505832][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 415.517974][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 415.530108][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 415.542187][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 415.554454][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 415.566694][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 415.578796][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 415.590911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 415.602953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 416.098244][T17517] device wg2 left promiscuous mode [ 416.186161][T17513] device wg2 entered promiscuous mode [ 417.233056][T17545] device syzkaller0 entered promiscuous mode [ 417.559552][ T24] audit: type=1400 audit(1773758898.370:175): avc: denied { create } for pid=17568 comm="syz.2.4854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 419.022769][T17590] device syzkaller0 entered promiscuous mode [ 419.200955][T17592] device syzkaller0 entered promiscuous mode [ 419.217927][T17592] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 420.498243][ C1] net_ratelimit: 54435 callbacks suppressed [ 420.498269][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 420.517697][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 420.530644][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.543675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.557197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 420.571046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 420.587584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 420.600852][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 420.613387][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 420.627165][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 421.315110][T17656] device syzkaller0 entered promiscuous mode [ 422.125883][T17709] device wg2 left promiscuous mode [ 422.259601][T17710] device wg2 entered promiscuous mode [ 422.684975][T17732] device syzkaller0 entered promiscuous mode [ 422.994664][T17748] cgroup: fork rejected by pids controller in /syz3 [ 423.681221][T17778] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.903467][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 423.962739][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.969934][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 425.508325][ C1] net_ratelimit: 52126 callbacks suppressed [ 425.508370][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 425.527534][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 425.540068][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 425.553042][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 425.566418][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 425.579395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 425.592037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 425.604836][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 425.617501][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 425.631282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 426.494208][T17837] cgroup: fork rejected by pids controller in /syz4 [ 426.735162][T17829] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.742438][T17829] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.750226][T17829] device bridge_slave_0 entered promiscuous mode [ 426.767503][T17829] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.774649][T17829] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.790241][T17829] device bridge_slave_1 entered promiscuous mode [ 427.263670][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 427.387802][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.520282][ C1] net_ratelimit: 25560 callbacks suppressed [ 430.520761][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 430.540808][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 430.555635][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 430.570598][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 430.587804][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 430.604312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 430.618401][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.637498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.654735][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 430.672386][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 431.608062][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 431.618596][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 431.626915][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.634010][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.666520][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 431.675446][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 431.685537][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 431.696526][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.705793][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.755987][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 431.766436][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 431.776985][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 431.785633][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 431.855167][T17829] device veth0_vlan entered promiscuous mode [ 431.867738][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 431.881621][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 431.892724][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 431.901830][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 431.924426][T17829] device veth1_macvtap entered promiscuous mode [ 431.932242][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 431.960231][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 431.968001][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 431.977348][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 431.986068][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 432.013312][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 432.023056][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 432.091171][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 432.159838][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 432.750662][T18001] device aaaaaaaaaaaaaaa entered promiscuous mode [ 433.793093][ T340] device gretap0 left promiscuous mode [ 433.827412][ T340] bridge0: port 3(gretap0) entered disabled state [ 433.926169][T18003] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.934316][T18003] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.952208][T18003] device bridge_slave_0 entered promiscuous mode [ 434.056532][T18003] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.077708][T18003] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.115927][T18003] device bridge_slave_1 entered promiscuous mode [ 434.911885][T18003] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.919018][T18003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.998822][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.261812][ T340] device bridge_slave_1 left promiscuous mode [ 435.284669][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.349024][ T340] device bridge_slave_0 left promiscuous mode [ 435.384012][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.527402][ C1] net_ratelimit: 47331 callbacks suppressed [ 435.527416][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 435.545677][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 435.557847][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 435.570060][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 435.582623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 435.594744][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.607127][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.619294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0) [ 435.631494][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 435.643818][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:41:9c:a1:38:51, vlan:0) [ 435.660549][ T340] device veth0_vlan left promiscuous mode [ 436.372861][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 436.380827][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 436.417867][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 436.433685][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 436.465032][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.472129][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.507779][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 436.538164][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 436.556638][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.563762][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.617674][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 436.632511][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 436.648003][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 436.667812][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 436.810629][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 436.847876][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 436.872360][T18003] device veth0_vlan entered promiscuous mode [ 436.960351][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 436.980143][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 437.014671][T18003] device veth1_macvtap entered promiscuous mode [ 437.202230][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 437.213451][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 437.229711][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 437.248508][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 437.267803][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 437.324653][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 437.342102][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 437.372092][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 437.390577][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 437.539495][T18097] : port 1(ip6gretap0) entered blocking state [ 437.547704][T18097] : port 1(ip6gretap0) entered disabled state [ 437.578189][T18097] device ip6gretap0 entered promiscuous mode [ 437.658625][T18095] device ip6gretap0 left promiscuous mode [ 437.698717][T18095] : port 1(ip6gretap0) entered disabled state [ 437.903773][T18108] device lo entered promiscuous mode [ 439.168594][T18121] general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN [ 439.180356][T18121] KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] [ 439.188841][T18121] CPU: 1 PID: 18121 Comm: syz.3.4979 Tainted: G W syzkaller #0 [ 439.197702][T18121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 439.207813][T18121] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 439.213898][T18121] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 439.233517][T18121] RSP: 0000:ffffc9000198f680 EFLAGS: 00010202 [ 439.239595][T18121] RAX: 0000000000000004 RBX: 1ffff11024d45c79 RCX: a9bd929ba07c9e00 [ 439.247579][T18121] RDX: ffffc90003162000 RSI: 000000000000038e RDI: 000000000000038f [ 439.255561][T18121] RBP: ffffc9000198f780 R08: ffff8881f7152fb7 R09: 1ffff1103ee2a5f6 [ 439.263537][T18121] R10: dffffc0000000000 R11: ffffed103ee2a5f7 R12: 0000000000000000 [ 439.271600][T18121] R13: 0000000000000020 R14: 1ffff92000331ed8 R15: dffffc0000000000 [ 439.279582][T18121] FS: 00007f568bd1e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 439.288515][T18121] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 439.295206][T18121] CR2: 00007f568bd1cec0 CR3: 0000000126974000 CR4: 00000000003506a0 [ 439.303182][T18121] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 439.311158][T18121] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 439.319257][T18121] Call Trace: [ 439.322571][T18121] ? is_bpf_text_address+0x177/0x190 [ 439.327869][T18121] ? perf_pending_event+0x560/0x560 [ 439.333082][T18121] ? unwind_get_return_address+0x4d/0x90 [ 439.338819][T18121] ? __this_cpu_preempt_check+0x13/0x20 [ 439.344370][T18121] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 439.350714][T18121] __perf_event_overflow+0x1b3/0x340 [ 439.356048][T18121] perf_swevent_event+0x2f7/0x530 [ 439.361104][T18121] ___perf_sw_event+0x3aa/0x4d0 [ 439.365962][T18121] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 439.372383][T18121] ? arch_do_signal_or_restart+0xe2/0x11d0 [ 439.378195][T18121] ? exit_to_user_mode_loop+0xa2/0xe0 [ 439.383566][T18121] ? exit_to_user_mode_prepare+0x76/0xa0 [ 439.389204][T18121] ? irqentry_exit_to_user_mode+0x9/0x10 [ 439.394838][T18121] ? irqentry_exit+0x12/0x60 [ 439.399439][T18121] ? __this_cpu_preempt_check+0x13/0x20 [ 439.405106][T18121] ? do_softirq_own_stack+0x6c/0x80 [ 439.410333][T18121] __perf_sw_event+0x134/0x270 [ 439.415111][T18121] do_user_addr_fault+0xc76/0xc90 [ 439.420501][T18121] ? copy_fpstate_to_sigframe+0x9f7/0xbb0 [ 439.426235][T18121] ? do_kern_addr_fault+0x80/0x80 [ 439.431277][T18121] ? fpregs_set+0x5d0/0x5d0 [ 439.435790][T18121] ? _raw_spin_unlock_irq+0x4e/0x70 [ 439.440996][T18121] exc_page_fault+0x5a/0xc0 [ 439.445768][T18121] asm_exc_page_fault+0x1e/0x30 [ 439.450752][T18121] RIP: 0010:arch_do_signal_or_restart+0x6b8/0x11d0 [ 439.457266][T18121] Code: 00 00 04 48 83 fb 01 b8 03 00 00 00 48 83 d8 00 49 83 3e 33 4c 89 74 24 68 75 04 48 83 c8 04 48 8b 4c 24 10 0f 01 cb 0f ae e8 <48> 89 41 08 48 c7 41 10 00 00 00 00 48 8d 59 18 48 8b 44 24 08 4c [ 439.477075][T18121] RSP: 0000:ffffc9000198fcc0 EFLAGS: 00050202 [ 439.483167][T18121] RAX: 0000000000000007 RBX: 0000000004000000 RCX: 00007f568bd1ceb8 [ 439.491870][T18121] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 439.499951][T18121] RBP: ffffc9000198feb8 R08: 0000000000000000 R09: 1ffffffff0dcd3c5 [ 439.507937][T18121] R10: dffffc0000000000 R11: fffffbfff0dcd3c6 R12: ffff888115b04f00 [ 439.515920][T18121] R13: dffffc0000000000 R14: ffffc9000198ffe0 R15: ffffc9000198ff58 [ 439.523936][T18121] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 439.529588][T18121] exit_to_user_mode_loop+0xa2/0xe0 [ 439.534793][T18121] exit_to_user_mode_prepare+0x76/0xa0 [ 439.540617][T18121] irqentry_exit_to_user_mode+0x9/0x10 [ 439.546083][T18121] irqentry_exit+0x12/0x60 [ 439.550518][T18121] exc_page_fault+0x67/0xc0 [ 439.555041][T18121] ? asm_exc_page_fault+0x8/0x30 [ 439.560167][T18121] asm_exc_page_fault+0x1e/0x30 [ 439.565037][T18121] RIP: 0033:0x7f568d27ed96 [ 439.569465][T18121] Code: 8b 5b 18 48 85 db 74 3c 48 89 da 49 8b 45 30 48 89 d9 48 c1 c8 11 64 48 33 04 25 30 00 00 00 4c 29 e2 4c 29 e0 48 39 c2 72 ca <64> 48 89 0c 25 f8 02 00 00 48 83 c4 08 5b 5d 41 5c 41 5d c3 66 0f [ 439.589090][T18121] RSP: 002b:00007f568bd1d450 EFLAGS: 00010246 [ 439.595411][T18121] RAX: 00007f568bd1e6c0 RBX: 0000000000000000 RCX: 0000000000000000 [ 439.603393][T18121] RDX: 0000000000000001 RSI: ffffffffffffe478 RDI: 00007f568bd1e598 [ 439.611370][T18121] RBP: ffffffffffffe478 R08: 0000000000000000 R09: 0000000000000000 [ 439.619346][T18121] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f568bd1f000 [ 439.627324][T18121] R13: 00007f568bd1e598 R14: 00007f568d53cfa0 R15: 00007ffd1baa9ad8 [ 439.635334][T18121] Modules linked in: [ 439.641462][ T24] audit: type=1400 audit(1773758920.450:176): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 439.648010][T18121] ---[ end trace 8e44170b1d4a7e1c ]--- [ 439.668254][ T24] audit: type=1400 audit(1773758920.450:177): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 439.676647][T18121] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 439.692848][ T24] audit: type=1400 audit(1773758920.450:178): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 439.692868][ T24] audit: type=1400 audit(1773758920.450:179): avc: denied { add_name } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 439.692885][ T24] audit: type=1400 audit(1773758920.450:180): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 439.692903][ T24] audit: type=1400 audit(1773758920.450:181): avc: denied { append open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 439.692921][ T24] audit: type=1400 audit(1773758920.450:182): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 439.820643][T18121] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 439.844711][T18121] RSP: 0000:ffffc9000198f680 EFLAGS: 00010202 [ 439.852954][T18121] RAX: 0000000000000004 RBX: 1ffff11024d45c79 RCX: a9bd929ba07c9e00 [ 439.863021][T18121] RDX: ffffc90003162000 RSI: 000000000000038e RDI: 000000000000038f [ 439.873140][T18121] RBP: ffffc9000198f780 R08: ffff8881f7152fb7 R09: 1ffff1103ee2a5f6 [ 439.883332][T18121] R10: dffffc0000000000 R11: ffffed103ee2a5f7 R12: 0000000000000000 [ 439.893485][T18121] R13: 0000000000000020 R14: 1ffff92000331ed8 R15: dffffc0000000000 [ 439.903674][T18121] FS: 00007f568bd1e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 439.917184][T18121] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 439.926028][T18121] CR2: 00007f568bd1cec0 CR3: 0000000126974000 CR4: 00000000003506a0 [ 439.936303][T18121] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 439.946388][T18121] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 439.956761][T18121] Kernel panic - not syncing: Fatal exception [ 439.963067][T18121] Kernel Offset: disabled [ 439.967414][T18121] Rebooting in 86400 seconds..