last executing test programs: 3.615890763s ago: executing program 2 (id=4644): socketpair(0x8, 0x5, 0x5, &(0x7f0000000140)) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000300)=r6) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb01001800000000000000880000008800000008000000090000000000000802000000820000000000000100000000420002001000000003000084070000000600000005000000010001000e0000000100000000100000030000000200000000000000080000000000000a010000000c0000000000001008000000030000000000001002000000000000000000000300000000020000000500000001000000006f305f48005f00"], &(0x7f0000000580)=""/48, 0xa8, 0x30, 0x1, 0x5}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0xfffffffffffffe3c}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r0}, 0xc) 1.647925832s ago: executing program 2 (id=4650): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xa}, 0xc05}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x10000, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032908000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xa8}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f0000000500)=""/207, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe72}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x35}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000500)=""/64}, 0x20) 1.534928442s ago: executing program 2 (id=4651): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a3, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0xce, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) 1.411740169s ago: executing program 4 (id=4654): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x122}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x275a, 0x0) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x41, &(0x7f0000000100)=r6, 0x8) setsockopt$sock_attach_bpf(r5, 0x1, 0x41, &(0x7f0000000100)=r4, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r7}, 0xc) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r8, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000002c0)="b9fef0076805268c98be14f0655847", 0x0, 0x81, 0x60000000, 0xffffffffffffffbd, 0x0, 0x0, 0x0}, 0x50) 1.368663101s ago: executing program 4 (id=4655): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40000}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x207) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x207) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3d, &(0x7f0000000000)='cgroup\x00\x8d\f\xf3\xcd\xc6X$\x01n-Hg\x144-.\xe2\x053\xe2\xf4\xbf[\xe9\xdddU\x91\x9d,\t\x8d\xc3@\x86,\x7f\xe2Z\xe8L\x80\xdbe~c\xbc\x9b\xcf\x9b\x1cH\x95\xf3'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x5}, 0x200, 0x4000000000, 0x0, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r2, 0x0, 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8982, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8982, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x1, 0x0, 0xd66}, 0x0) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x2, &(0x7f00000000c0), 0x31}, 0x0) (async) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x2, &(0x7f00000000c0), 0x31}, 0x0) sendmsg$inet(r4, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x40040) socketpair(0x28, 0x2, 0x28, 0x0) write$cgroup_int(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYRES64=r4], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x53, '\x00', 0x0, @cgroup_sock}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="02"], 0x10) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)=ANY=[@ANYRES32=r8, @ANYRES32, @ANYBLOB="020000000000000000400000", @ANYRES32, @ANYBLOB="8a54ffff690000", @ANYRES64=0x0], 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 1.124731096s ago: executing program 2 (id=4656): ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0xc18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000030000000800000005"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007300000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000bc0)={r3, 0x0, 0x0}, 0x10) socketpair(0x1, 0x5, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000030000000200000002"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 730.397624ms ago: executing program 3 (id=4662): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x100, 0x0, 0x1, 0xf74, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0xfffffffc, 0x7a, 0x709, 0x40004, 0xffffffffffffffff, 0x37, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x2}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000200000000000000020000040800000000000000"], 0x0, 0x56}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000540), &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f00000005c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000006c0), 0x0, 0x0, 0xe4, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r4, r3, 0x0, 0x1}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x41000, 0x44, '\x00', r4, 0x1b, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x1, 0x0, 0x8, 0x18000000}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0x37}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000004c0)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{0x1, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000780), &(0x7f00000007c0)='%pK \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x4, 0x13, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x80000000, 0x5c, &(0x7f00000002c0)=""/92, 0x41100, 0x8, '\x00', r4, @fallback=0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0xb, 0x6}, 0x10, 0xffffffffffffffff, r5, 0x1, &(0x7f0000000840)=[r6, r7, 0x1, r8, 0x1, 0x1, r9], &(0x7f0000000880)=[{0x3, 0x4, 0x5, 0xa}], 0x10, 0xfffffff8}, 0x94) r10 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r11}, 0x0, &(0x7f0000000040)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r12) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 655.521161ms ago: executing program 0 (id=4663): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffff9402000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8808, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x3, 0x0, 0x3129b7164949479, 0x7, 0xffffffff, 0x802, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x19) r0 = perf_event_open(&(0x7f00000014c0)={0x5, 0x80, 0x0, 0xfe, 0xff, 0x5, 0x0, 0x3, 0x9234d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x1590, 0x0, 0x8, 0x1, 0x3, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4010, r3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 654.45848ms ago: executing program 0 (id=4664): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000800008500000050000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff20) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000200)={'full', 0x20, 0x6, 0x20, 0xfffffffffffffffa}, 0x2f) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0ffc40bffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400210000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000592000009500000000000000a3028cb5af6c8f5d76781dcb7729f0170720596bb3b4d821d976f5843061cc2e3afbae82d7932d192321fa3b3042f100"/172], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0ffc40bffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400210000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000592000009500000000000000a3028cb5af6c8f5d76781dcb7729f0170720596bb3b4d821d976f5843061cc2e3afbae82d7932d192321fa3b3042f100"/172], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0x103, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1d, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0), 0x0, 0xd4, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xb5, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0x103, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1d, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0), 0x0, 0xd4, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xb5, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc0045878, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc0045878, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000540000000000000070000006b112a000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r4, &(0x7f0000000280), &(0x7f0000000000)=""/3, 0x2}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r4, &(0x7f0000000280), &(0x7f0000000000)=""/3, 0x2}, 0x20) close(r3) 574.271465ms ago: executing program 3 (id=4665): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x10, 0x3, &(0x7f0000000bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4074}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r0, 0x27, 0xe, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b0800", 0x0, 0x8d8b, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) 544.08114ms ago: executing program 1 (id=4666): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000000000000000000000000000b155eba466da0474f41f18632f78feaeed2b35acbe80d0cc6d6079c7ad36c7d442e02ffe9496ef8b36a5b322fe861ba9a35b068b2fc043d9dd467f043851d8e24dc79f3e4004ff15e75aa28720d45f0277f99c02e73b87c789e2e9a6b246695323782ebd7eb349e1a83751e0ce06165034d0610913ca527b4b609a933f37fd4750382c65d8880519b1e72edcd1aa4d2723cce6abb10c2a06992419cfd2fac8a46fa17c883c042bbfe9bc762560", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0xc, [@type_tag={0x3, 0x0, 0x0, 0x12, 0x4}, @float={0x8, 0x0, 0x0, 0x10, 0x10}, @type_tag={0xd, 0x0, 0x0, 0x12, 0x1}, @enum64={0xb, 0x2, 0x0, 0x13, 0x1, 0x6, [{0x9, 0x81, 0x30000000}, {0x2, 0x6, 0xfa}]}]}, {0x0, [0x2e, 0x5f, 0x61, 0x2e, 0x5f, 0x0, 0x5f, 0x5f, 0x2e, 0x5f]}}, &(0x7f00000003c0)=""/110, 0x6c, 0x6e, 0x0, 0xfffffffd, 0x10000}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x16, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, r2, 0x8, &(0x7f0000000000)={0xfffffffd}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 393.293122ms ago: executing program 0 (id=4667): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x5e11, 0x1, 0x0, 0x5, 0x4, 0x0, 0x2000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (rerun: 64) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async, rerun: 64) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) (async, rerun: 64) socketpair(0x8, 0x4, 0x9, &(0x7f0000000200)) (async) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000004000000000000000300000001000000", @ANYRES32=0x1, @ANYBLOB="00ffffff00"/20, @ANYRES32=r2, @ANYRES32, @ANYBLOB="040000000200000005000000c58c120fa5ce00"/28], 0x50) socketpair(0xb, 0xa, 0x7ffffffe, &(0x7f0000000000)) 384.362671ms ago: executing program 1 (id=4668): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000540)={0x0, r0}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x9, [@var={0x9, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x2e, 0x2e, 0x61, 0x61, 0x30, 0x2e, 0x5f]}}, &(0x7f0000000580)=""/250, 0x31, 0xfa, 0x1}, 0x28) (async, rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async, rerun: 32) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000500), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x1421}) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x541b, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="18508b26520d7197334121f62d56a7cd79f7000000000018", @ANYRES16=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x6}, 0x94) (rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x5, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0xb) (async) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0x15) (async) write$cgroup_int(r7, &(0x7f0000000440), 0x12) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000300)=r8) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 383.000811ms ago: executing program 2 (id=4669): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) close(r3) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async, rerun: 64) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (rerun: 64) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000800)={'ip6gretap0\x00', 0xe3991bdbbfed0d53}) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360"], 0xffdd) 382.79932ms ago: executing program 3 (id=4670): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8}, 0x8}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000012c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x100, 0x100, 0xa, [@enum={0xa, 0x2, 0x0, 0x6, 0x4, [{0x8, 0x3ff}, {0xf, 0x7}]}, @var={0x6, 0x0, 0x0, 0xe, 0x4, 0xc8c971a69a05a5d5}, @enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x0, 0x252}, {0x5}, {0x3, 0xd}, {0x2, 0x8}, {0x2}, {0x5, 0x7}]}, @struct={0x9, 0x6, 0x0, 0x4, 0x0, 0x6, [{0xe, 0x2, 0x2}, {0x8, 0x1, 0x8}, {0x0, 0x1, 0x2}, {0x10, 0x2, 0xe}, {0xd, 0x4, 0x1}, {0xe, 0x8, 0x3}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x0, 0x1}, {0xd}, {0x5, 0x2}, {0xc, 0x3}, {0xe, 0x2}, {0x8}, {0x2}]}]}, {0x0, [0xc1, 0x30, 0x5f, 0x0, 0x30, 0x2e, 0x0, 0x0]}}, &(0x7f00000000c0)=""/68, 0x122, 0x44, 0x0, 0xd806}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x1ff, 0xd, 0x5, 0x40000, r0, 0x7, '\x00', 0x0, r1, 0x1, 0x1, 0x0, 0xb}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="00d10a1549000000b703009050db0c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f3, &(0x7f0000000080)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001800)={{r0}, &(0x7f0000001780), &(0x7f00000017c0)='%-010d \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000080)={r0, &(0x7f0000000080), 0x0}, 0x20) 307.529407ms ago: executing program 4 (id=4671): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x0, 0x2e, 0xfffffbff, 0x3, 0x2, 0xfffffffe, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000006c0)={&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000400)="244ee0b5f9ad24a349838869674252c4242966066aa3d83c1938395ddac63d3edae43a", 0x23}, {&(0x7f0000000780)="b7359c36e1d9dcaf434fa8c527ef215d7fcdb5f189adf50b61e4a35411e2702ed5cc63be64bea3b78da61af5688b374b72391281025740592a92dd58d546721ab37f1fd77175a4fde8c75ead2fe08325b791c9d8d144837f7210a0878e31ea409cdeb9c473faa5f4eb05a3c9cbd7166548cb24f1e144c3a3f56c201be3261c0d86d0ce64644aee9c59fc3f813f3f58e42a259a121bfbb668f54f729d5fafeb173645414f14202c43d94e9c9952287242ec97de1aee21a00f0bf56ea4", 0xbc}], 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="3c000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x20, 0x8040}, 0x40040) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="000000000072112ed2add4ffffff020000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000200)="689aef7fddce00000000000000694cdd0e3510e77d6cff707883cf329c6520b0fb3e", &(0x7f0000000840)=""/172}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000300)=r8) (async) write$cgroup_devices(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x1c, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000218110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000700850000001700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000040000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa224, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0200000004000000020000000c00080000140000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000e8ffffff00a1349bb8b6000000000000000008"], 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r9, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 307.012966ms ago: executing program 3 (id=4672): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x800, 0x8, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x7}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r0}, 0x38) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x2, 0x2, 0x11, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xa}, 0xc05}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x63}, [@ldst={0x6, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000200)={0x3, 0x80, 0x8, 0x5, 0x8, 0x6, 0x0, 0x8000000000000000, 0xa0440, 0xe, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000100), 0x2}, 0x20a3, 0x9, 0x4, 0x1, 0x7, 0xc, 0x5, 0x0, 0x9, 0x0, 0x9}) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r0}, 0x38) 299.611255ms ago: executing program 1 (id=4673): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000380), 0x0, 0x0, &(0x7f00000003c0)=""/45, 0x2d}}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4adb9d5}, [@jmp={0x5, 0x1, 0x7, 0x3, 0x0, 0xffffffffffffffff, 0x10}, @generic={0x2, 0x0, 0x6, 0x6, 0xf}]}, &(0x7f00000004c0)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xb, 0x2, 0x2}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000580)=[{0x4, 0x3, 0x6, 0xc}, {0x5, 0x1, 0xa, 0xb}, {0x5, 0x4, 0x2, 0x1}, {0x4, 0x1, 0xf, 0x2}, {0x1, 0x4, 0xb, 0x7}, {0x5, 0x3, 0x0, 0x1}], 0x10, 0xb7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1, 0xd, &(0x7f0000000180)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x39, &(0x7f0000000240)=""/57, 0x41000, 0x0, '\x00', r1, @fallback=0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r2, r3, 0x1, 0x0, &(0x7f00000006c0)=[{0x4, 0x5, 0xf, 0x5}], 0x10, 0x78}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x7, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1f, 0xe, &(0x7f0000000b80)=ANY=[@ANYRES64=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4}, 0x94) 283.874802ms ago: executing program 1 (id=4674): bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) socketpair(0x0, 0x800, 0x200000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000080)) 227.661892ms ago: executing program 4 (id=4675): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pS \x00'}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x5, [@type_tag={0xf, 0x0, 0x0, 0x12, 0x1}, @func={0x5, 0x0, 0x0, 0xc, 0x4}, @union={0xa, 0x3, 0x0, 0x5, 0x1, 0x0, [{0x6, 0x2, 0x5}, {0x3, 0x1, 0x9}, {0xb, 0x2, 0x7}]}, @ptr={0xd}]}, {0x0, [0x2e, 0x2e, 0x5f]}}, &(0x7f0000000280)=""/148, 0x71, 0x94, 0x1, 0x400}, 0x28) (async, rerun: 32) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={r0, r1}, 0xc) (async, rerun: 32) socketpair(0x11, 0x2, 0x80000000, &(0x7f00000003c0)) syz_clone(0x41500, 0x0, 0xd, 0xfffffffffffffffd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000380)={r0, r1}, 0xc) 225.416561ms ago: executing program 3 (id=4676): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4310}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0xc0000, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, 0x0) (async) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) 224.879382ms ago: executing program 0 (id=4677): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0xf, 0x1, 0xfffff74f, 0x7, 0x801, 0xffffffffffffffff, 0x9c, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x1}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="1bfeffffffffffffff0000000080000f00000000e29ccd8bce87215fe638596196c9a01e56d974ad6145b8f8e9937f9e2663fbedf6dc89e3e0abbdcab1e26e0e22d570c44434dc7831e88a7765e81efc53627dcc692c4889a94456190d136a0df0405caa7d13021addc57b427d94a2b872c79e8194dafd0a3c60cb82e023a7fd35110d721be1476b5d36d9ab135cdcbd7075a148dcc9b58129", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="4b707be088d0cea3ebd37398216d90f0b999bca1b83658e57e0f790932040cbc690a950f9dd74538ff6f38704b939b155498f5473921106345fbcf4d2976964370cde33c25c7660cea77ac1a309cf8e73467be048487f91bb7990f5f5abdcd4e1569db65107e5e90c8392c380e553b6d4f897322fd47a65379463ab53f802ae7648c9ad23a2290649726c7fb4e76e1b79effb51f5e05bb68fb548892a59d3f4f6a6570d6741ce78878ab98957d996a8920dfa0f66cda562d531a773a53c1101d82e9651bd1f05781ceb64892c075bcf64a1de4a91d4af61aa04e3c4d2df8bcc6d8a6", @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="11000000040000000400000080"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x1, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x43}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x45e}, [@map_val={0x18, 0x6, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6}, @alu={0x7, 0x1, 0x2, 0x9, 0x4, 0x10, 0x4}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10001}]}, &(0x7f0000000400)='GPL\x00', 0xc, 0xe0, &(0x7f0000000780)=""/224, 0xc2f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000008c0)={0x0, 0xf, 0x7fff, 0x80}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000980)=[r2, r4, r5, r6], &(0x7f00000009c0)=[{0x2, 0x3, 0xc, 0x5}, {0x2, 0x2, 0x3, 0xc}, {0x0, 0x2, 0xe}], 0x10, 0x800}, 0x94) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', r0, 0x4000, r0}, 0x18) (async) r7 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) (async) r9 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r9, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r11, 0x20e, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r11, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0xa9, &(0x7f0000000500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x19, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r12, r11}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000980)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r10, @sched_cls=0x2f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r12}, 0x94) 211.421849ms ago: executing program 1 (id=4678): perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x1) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1ff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7}, 0x0, 0xaffffffffffffffc, 0xffffffffffffffff, 0x0) (rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5c}, 0x28) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xffb0}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x600}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff13}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x9}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x5, 0x1, 0x7, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 102.068779ms ago: executing program 0 (id=4679): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800280000000a000000070000000100000f030000f8eb9a6724953f8dcd402b439f4f3875cf1d24d59805000300000000000000fcfffeff000000000000000000000f010000005d0000003915d9"], &(0x7f00000002c0)=""/254, 0x4a, 0xfe, 0x1}, 0x28) 97.437379ms ago: executing program 1 (id=4680): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000860000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000001000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x1f, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/300], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc90}, 0x48) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) (async, rerun: 64) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) (rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r7, r6}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r7, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x39, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000340), &(0x7f0000000600), 0x8, 0xd0, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) 52.36089ms ago: executing program 2 (id=4681): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 51.411989ms ago: executing program 4 (id=4682): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'veth1_macvtap\x00', @multicast}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'veth1_macvtap\x00', @multicast}) (async) 51.081089ms ago: executing program 3 (id=4683): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000000000080f1000000000000063000000000000009500050000000000d1449c003b097606b153e6dc6de837ae96a815df705fef53cf0ff5e7bdc3bd95cfc0d4800fae421c84b7988e61ed7df452e4b7e139044387aa"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xba, &(0x7f0000000440)=""/186, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x21) r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x30100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 50.137619ms ago: executing program 0 (id=4684): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073013902000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x6, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) r1 = getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x3, 0x9, 0x3, 0x0, 0x4, 0x80480, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x66, 0x0, @perf_config_ext={0xfff, 0x9}, 0x11000, 0x3, 0x5fe352f5, 0x0, 0x7, 0xf, 0xfff0, 0x0, 0x2, 0x0, 0x38}, r1, 0xc, r0, 0x9) getpid() 0s ago: executing program 4 (id=4685): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="09000000040000000c0000000b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000240)=""/252, 0x37, 0xfc, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000040)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x14, &(0x7f00000000c0)={0x0, 0x11}, 0x1, 0x10, &(0x7f0000000000), 0xa, 0x0, 0xffffffffffffffff, 0x4c}, 0x70) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xd4, 0x4, [@var={0xf, 0x0, 0x0, 0xe, 0x4, 0x2}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x4, 0x4}, {0x9, 0x5}, {0x2, 0x5}, {0xa, 0x2}]}, @struct={0x3, 0x3, 0x0, 0x4, 0x0, 0x10, [{0xd, 0x0, 0x3}, {0xf, 0x3, 0xb5a}, {0xd, 0x0, 0x7}]}, @union={0x10, 0x1, 0x0, 0x5, 0x0, 0x10001, [{0x7, 0x3, 0xd}]}, @enum={0xf, 0x5, 0x0, 0x6, 0x4, [{0x1, 0x1}, {0x4, 0xc000}, {0xf, 0x10001}, {0xf, 0x8}, {0x6, 0xffffffff}]}, @var={0xb, 0x0, 0x0, 0xe, 0x4, 0x1}, @ptr={0xb, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x61, 0x30]}}, &(0x7f00000001c0)=""/72, 0xf0, 0x48, 0x0, 0xb8, 0x10000}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2a, 0x18, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6aae}, [@generic={0x2, 0x8, 0x3, 0x2, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfdb}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @exit, @generic={0xa, 0x5, 0xa, 0xb2cb, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000640)='GPL\x00', 0x5, 0xf0, &(0x7f0000000780)=""/240, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, 0x0, &(0x7f0000000680)=[{0x4, 0x1, 0x0, 0xb}, {0x2, 0x1, 0x9, 0x2}, {0x2, 0x1, 0x1, 0x6}, {0x2, 0x3, 0x9, 0x4}, {0x0, 0x3, 0x1}, {0x4, 0x3, 0x8, 0x5}, {0x3, 0x1, 0x0, 0xc}], 0x10, 0x3}, 0x94) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xb, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000061114c000000000085000000270000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x80) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000009c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a80)={{0x1, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000a40)='%+9llu \x00'}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xfd, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xe, 0x14, &(0x7f00000000c0)=@raw=[@map_idx_val={0x18, 0x4, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @jmp={0x5, 0x0, 0xd, 0x5, 0x7, 0xfffffffffffffff8, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @call={0x85, 0x0, 0x0, 0x9e}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000180)='syzkaller\x00', 0x7fffffff, 0xd2, &(0x7f00000002c0)=""/210, 0x40f00, 0x44, '\x00', 0x0, @sk_skb=0x26, r3, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0x2, 0x0, 0x4}, 0x10, 0x0, r4, 0x5, &(0x7f0000000b00)=[r5, r6, r7, r8, r9], &(0x7f0000000b40)=[{0x1, 0x2, 0x5, 0x4}, {0x0, 0x1, 0x8, 0xa}, {0x2, 0x5, 0xd, 0x5}, {0x1, 0x4, 0x8, 0x3}, {0x1, 0x1, 0xc, 0x7}]}, 0x94) perf_event_open(&(0x7f0000000240)={0x2, 0x78, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) kernel console output (not intermixed with test programs): 4] device syzkaller0 entered promiscuous mode [ 54.430201][ T1720] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.444028][ T1720] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.858802][ T1722] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.865902][ T1722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.873225][ T1722] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.880341][ T1722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.923526][ T1722] device bridge0 entered promiscuous mode [ 55.173519][ T1743] device syzkaller0 entered promiscuous mode [ 55.658870][ T1769] : renamed from bond_slave_0 [ 55.684341][ T1775] bridge0: port 4(gretap0) entered blocking state [ 55.691199][ T1775] bridge0: port 4(gretap0) entered disabled state [ 55.698050][ T1775] device gretap0 entered promiscuous mode [ 55.704280][ T1775] bridge0: port 4(gretap0) entered blocking state [ 55.710725][ T1775] bridge0: port 4(gretap0) entered forwarding state [ 55.814173][ T1787] device syzkaller0 entered promiscuous mode [ 55.865495][ T1790] device syzkaller0 entered promiscuous mode [ 56.905686][ T1820] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 57.763001][ T1893] syz.1.435[1893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.763052][ T1893] syz.1.435[1893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.417493][ T1909] device syzkaller0 entered promiscuous mode [ 58.714716][ T1923] nr0: port 1(macsec0) entered blocking state [ 58.722083][ T1923] nr0: port 1(macsec0) entered disabled state [ 58.736715][ T1929] device syzkaller0 entered promiscuous mode [ 61.306847][ T2030] nr0: port 1(macsec0) entered blocking state [ 61.323942][ T2030] nr0: port 1(macsec0) entered disabled state [ 61.420160][ T2030] device macsec0 entered promiscuous mode [ 62.183224][ T2039] : port 1(ip6gretap0) entered blocking state [ 62.189410][ T2039] : port 1(ip6gretap0) entered disabled state [ 62.198969][ T2039] device ip6gretap0 entered promiscuous mode [ 63.198814][ T2083] device syzkaller0 entered promiscuous mode [ 63.916998][ T2100] device syzkaller0 entered promiscuous mode [ 64.409434][ T2117] -1: renamed from syzkaller0 [ 65.135342][ T24] audit: type=1400 audit(1773268285.189:149): avc: denied { append } for pid=2148 comm="syz.3.502" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 67.332442][ T2196] device syzkaller0 entered promiscuous mode [ 67.855114][ T2212] device syzkaller0 entered promiscuous mode [ 68.410627][ T2249] device syzkaller0 entered promiscuous mode [ 69.822233][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.851713][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.873945][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 70.570629][ T2349] device veth1_to_bridge entered promiscuous mode [ 70.684529][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 70.798471][ T2362] device syzkaller0 entered promiscuous mode [ 70.853725][ T2362] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 70.860023][ T2362] syzkaller0: Linktype set failed because interface is up [ 70.868528][ T330] syzkaller0: tun_net_xmit 48 [ 70.899027][ T2362] syzkaller0: tun_chr_ioctl cmd 1074812118 [ 71.958713][ T2467] device syzkaller0 entered promiscuous mode [ 71.987447][ T2470] device syzkaller0 entered promiscuous mode [ 72.319292][ T2491] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.310992][ T2532] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.319686][ T2532] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.346887][ T2532] device bridge_slave_1 left promiscuous mode [ 73.429914][ T2532] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.444180][ T2532] device bridge_slave_0 left promiscuous mode [ 73.459873][ T2532] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.416564][ T2584] device syzkaller0 entered promiscuous mode [ 75.381805][ T24] audit: type=1400 audit(1773268295.439:150): avc: denied { create } for pid=2678 comm="syz.2.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 75.524678][ T2690] device syzkaller0 entered promiscuous mode [ 75.544859][ T670] syzkaller0: tun_net_xmit 48 [ 77.158365][ T2791] device syzkaller0 entered promiscuous mode [ 77.175911][ T2791] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 77.875626][ T24] audit: type=1400 audit(1773268297.929:151): avc: denied { create } for pid=2812 comm="syz.1.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 79.195433][ T2871] device aaaaaaaaaaaaaaa entered promiscuous mode [ 79.282181][ T2900] device syzkaller0 entered promiscuous mode [ 79.722744][ T2943] device syzkaller0 entered promiscuous mode [ 79.750218][ T2950] @: renamed from bond_slave_0 [ 79.764685][ T2943] device syzkaller0 left promiscuous mode [ 80.041997][ T2958] batadv0: tun_chr_ioctl cmd 2147767521 [ 80.096925][ T2960] device syzkaller0 entered promiscuous mode [ 80.115947][ T2960] device syzkaller0 left promiscuous mode [ 86.262438][ T24] audit: type=1400 audit(1773268306.319:152): avc: denied { create } for pid=3215 comm="syz.2.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 88.194716][ T3284] tun0: tun_chr_ioctl cmd 1074025692 [ 88.211105][ T3284] tun0: tun_chr_ioctl cmd 2147767506 [ 89.674412][ T24] audit: type=1400 audit(1773268309.729:153): avc: denied { create } for pid=3354 comm="syz.2.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 90.250163][ T3406] device wg2 entered promiscuous mode [ 91.107438][ T3432] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.131806][ T3432] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.160502][ T3432] device bridge0 left promiscuous mode [ 92.388765][ T3482] device syzkaller0 entered promiscuous mode [ 94.571107][ T3618] device syzkaller0 entered promiscuous mode [ 97.034411][ T3678] bridge0: port 3(veth0_vlan) entered disabled state [ 97.175895][ T3686] tap0: tun_chr_ioctl cmd 1074025677 [ 97.201257][ T3686] tap0: linktype set to 778 [ 97.211098][ T3685] bridge0: port 3(veth0_vlan) entered blocking state [ 97.217819][ T3685] bridge0: port 3(veth0_vlan) entered forwarding state [ 97.492892][ T3685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.633229][ T2882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.657618][ T2882] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.741451][ T2882] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.272645][ T3741] device syzkaller0 entered promiscuous mode [ 101.635634][ T3852] device syzkaller0 entered promiscuous mode [ 101.713421][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.720601][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.744097][ T3852] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.751169][ T3852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.758474][ T3852] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.765512][ T3852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.825243][ T3852] device bridge0 entered promiscuous mode [ 102.440553][ T3902] +: renamed from team_slave_1 [ 102.457263][ T3907] device syzkaller0 entered promiscuous mode [ 102.878827][ T3943] device syzkaller0 entered promiscuous mode [ 103.073591][ T3977] tap0: tun_chr_ioctl cmd 35108 [ 103.079075][ T3977] tap0: tun_chr_ioctl cmd 2147767507 [ 103.631503][ T3988] device syzkaller0 entered promiscuous mode [ 103.864164][ T4005] device syzkaller0 entered promiscuous mode [ 103.983281][ T4012] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 103.992725][ T4012] syzkaller0: linktype set to 0 [ 104.043907][ T4023] device pim6reg1 entered promiscuous mode [ 104.800649][ T4080] erspan0: refused to change device tx_queue_len [ 107.619285][ T4173] device veth1_macvtap left promiscuous mode [ 107.771157][ T4178] device veth1_macvtap entered promiscuous mode [ 107.845453][ T4178] device macsec0 entered promiscuous mode [ 108.186970][ T4205] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 110.348797][ T4297] device syzkaller0 entered promiscuous mode [ 110.795375][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 110.817795][ T4363] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 112.063060][ T4428] device syzkaller0 entered promiscuous mode [ 112.853780][ T4537] device syzkaller0 entered promiscuous mode [ 113.995997][ T4569] device syzkaller0 entered promiscuous mode [ 114.242254][ T4575] device wg2 entered promiscuous mode [ 114.399434][ T4581] device syzkaller0 entered promiscuous mode [ 117.091338][ T4696] device syzkaller0 entered promiscuous mode [ 118.006874][ T4727] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 118.253329][ T4716] syzkaller0: tun_chr_ioctl cmd 35092 [ 118.724194][ T4771] device syzkaller0 entered promiscuous mode [ 121.030516][ T4849] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 121.204076][ T4854] device syzkaller0 entered promiscuous mode [ 121.990506][ T4882] device syzkaller0 entered promiscuous mode [ 122.010156][ T2882] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 122.162564][ T4890] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.172958][ T4890] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.191447][ T4890] device bridge0 left promiscuous mode [ 122.314192][ T4891] device bridge_slave_1 left promiscuous mode [ 122.325330][ T4891] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.333178][ T4891] device bridge_slave_0 left promiscuous mode [ 122.339349][ T4891] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.560918][ T24] audit: type=1400 audit(1773268343.619:154): avc: denied { create } for pid=4953 comm="syz.0.1304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 123.942096][ T4989] device syzkaller0 entered promiscuous mode [ 124.285810][ T5025] device syzkaller0 entered promiscuous mode [ 124.348231][ T5028] device syzkaller0 entered promiscuous mode [ 124.591485][ T24] audit: type=1400 audit(1773268344.649:155): avc: denied { read } for pid=5033 comm="syz.4.1325" dev="nsfs" ino=4026532484 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 124.776520][ T24] audit: type=1400 audit(1773268344.669:156): avc: denied { open } for pid=5033 comm="syz.4.1325" path="net:[4026532484]" dev="nsfs" ino=4026532484 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 125.149526][ T24] audit: type=1400 audit(1773268345.139:157): avc: denied { create } for pid=5057 comm="syz.1.1330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 130.007239][ T5175] device syzkaller0 entered promiscuous mode [ 130.112899][ T24] audit: type=1400 audit(1773268350.169:158): avc: denied { setattr } for pid=5186 comm="syz.0.1368" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 131.891826][ T5320] : renamed from vlan1 [ 132.059077][ T5330] device wg2 left promiscuous mode [ 132.186175][ T5334] device wg2 entered promiscuous mode [ 132.819595][ T5347] device syzkaller0 entered promiscuous mode [ 135.548781][ T5451] device sit0 entered promiscuous mode [ 136.934979][ T24] audit: type=1400 audit(1773268356.989:159): avc: denied { read } for pid=5478 comm="syz.3.1450" name="cgroup.subtree_control" dev="cgroup2" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 137.272709][ T24] audit: type=1400 audit(1773268357.329:160): avc: denied { create } for pid=5490 comm="syz.2.1455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 137.683230][ T24] audit: type=1400 audit(1773268357.739:161): avc: denied { ioctl } for pid=5536 comm="syz.0.1469" path="net:[4026532293]" dev="nsfs" ino=4026532293 ioctlcmd=0x2406 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 141.229551][ T5645] device syzkaller0 entered promiscuous mode [ 141.334114][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 141.344300][ T24] audit: type=1400 audit(1773268361.399:162): avc: denied { create } for pid=5644 comm="syz.1.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 142.786739][ T24] audit: type=1400 audit(1773268362.829:163): avc: denied { create } for pid=5716 comm="syz.0.1521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 142.921725][ T5734] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 143.645872][ T5762] device veth1_macvtap left promiscuous mode [ 143.865424][ T5785] device syzkaller0 entered promiscuous mode [ 143.886039][ T1134] syzkaller0: tun_net_xmit 76 [ 143.896061][ T1134] syzkaller0: tun_net_xmit 48 [ 143.909612][ C0] syzkaller0: tun_net_xmit 76 [ 146.921828][ T5883] device syzkaller0 entered promiscuous mode [ 148.498618][ T6000] device syzkaller0 entered promiscuous mode [ 149.996728][ T6089] device syzkaller0 entered promiscuous mode [ 150.870262][ T6131] device syzkaller0 entered promiscuous mode [ 151.672731][ T6178] device syzkaller0 entered promiscuous mode [ 152.294288][ T6228] device syzkaller0 entered promiscuous mode [ 152.831985][ T6262] device sit0 entered promiscuous mode [ 152.894767][ T6268] tun0: tun_chr_ioctl cmd 1074025677 [ 152.901561][ T6268] tun0: linktype set to 804 [ 154.631105][ T6352] device syzkaller0 entered promiscuous mode [ 154.675167][ T6376] device syzkaller0 entered promiscuous mode [ 154.740888][ T6393] device syzkaller0 entered promiscuous mode [ 154.757570][ T6395] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 155.101089][ T6435] device vlan0 entered promiscuous mode [ 156.804687][ T24] audit: type=1400 audit(1773268376.859:164): avc: denied { attach_queue } for pid=6485 comm="syz.2.1739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 157.489170][ T6546] tap0: tun_chr_ioctl cmd 1074025675 [ 157.499064][ T6546] tap0: persist enabled [ 157.508804][ T6546] tap0: tun_chr_ioctl cmd 1074025675 [ 157.514911][ T6546] tap0: persist disabled [ 157.538685][ T6546] device syzkaller0 entered promiscuous mode [ 158.453544][ T6568] device syzkaller0 entered promiscuous mode [ 158.788859][ T6585] device wg2 entered promiscuous mode [ 160.302152][ T24] audit: type=1400 audit(1773268380.359:165): avc: denied { create } for pid=6660 comm="syz.0.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 162.434047][ T6804] device syzkaller0 entered promiscuous mode [ 163.546339][ T6825] device wg2 left promiscuous mode [ 163.953025][ T6855] device vlan0 left promiscuous mode [ 164.177941][ T6866] device pim6reg1 entered promiscuous mode [ 165.387542][ T6949] device syzkaller0 entered promiscuous mode [ 166.159349][ T6966] device syzkaller0 entered promiscuous mode [ 167.734604][ T7044] batadv0: tun_chr_ioctl cmd 2148553947 [ 167.806764][ T7050] bridge0: port 3(gretap0) entered blocking state [ 167.815479][ T7050] bridge0: port 3(gretap0) entered disabled state [ 167.824498][ T7050] device gretap0 entered promiscuous mode [ 169.829418][ T6870] syz.3.1843 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 169.861583][ T6870] CPU: 0 PID: 6870 Comm: syz.3.1843 Tainted: G W syzkaller #0 [ 169.870353][ T6870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 169.880408][ T6870] Call Trace: [ 169.883701][ T6870] __dump_stack+0x21/0x24 [ 169.888013][ T6870] dump_stack_lvl+0x1a7/0x208 [ 169.892673][ T6870] ? show_regs_print_info+0x18/0x18 [ 169.897851][ T6870] ? ___ratelimit+0x3de/0x560 [ 169.902513][ T6870] ? __kasan_check_write+0x14/0x20 [ 169.907619][ T6870] ? _raw_spin_lock+0x94/0xf0 [ 169.912290][ T6870] dump_stack+0x15/0x1c [ 169.916437][ T6870] dump_header+0xdd/0x650 [ 169.920757][ T6870] oom_kill_process+0x1fa/0x2c0 [ 169.925592][ T6870] out_of_memory+0x93f/0xd20 [ 169.930170][ T6870] ? unregister_oom_notifier+0x20/0x20 [ 169.935616][ T6870] ? mutex_lock_killable+0x92/0xf0 [ 169.940718][ T6870] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 169.947206][ T6870] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 169.952738][ T6870] ? mem_cgroup_oom_trylock+0x350/0x350 [ 169.958266][ T6870] ? _raw_spin_trylock_bh+0x150/0x150 [ 169.963625][ T6870] ? _raw_spin_unlock+0x4d/0x70 [ 169.968457][ T6870] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 169.973985][ T6870] try_charge+0xf69/0x1500 [ 169.978392][ T6870] ? __memcg_kmem_charge+0x150/0x150 [ 169.983658][ T6870] ? percpu_counter_add_batch+0x13c/0x160 [ 169.989365][ T6870] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 169.994898][ T6870] __mem_cgroup_charge+0x14c/0x6d0 [ 169.999996][ T6870] shmem_add_to_page_cache+0x574/0xe30 [ 170.005444][ T6870] ? shmem_alloc_page+0x380/0x380 [ 170.010454][ T6870] ? _raw_spin_lock_irqsave+0x130/0x130 [ 170.015982][ T6870] ? find_lock_entry+0x4b/0x200 [ 170.020818][ T6870] shmem_getpage_gfp+0x8eb/0x2120 [ 170.025834][ T6870] shmem_write_begin+0xce/0x1b0 [ 170.030677][ T6870] generic_perform_write+0x2ce/0x540 [ 170.035948][ T6870] ? atime_needs_update+0x5b0/0x5b0 [ 170.041133][ T6870] ? grab_cache_page_write_begin+0xb0/0xb0 [ 170.046924][ T6870] ? file_remove_privs+0x5b0/0x5b0 [ 170.052020][ T6870] ? __kasan_check_write+0x14/0x20 [ 170.057113][ T6870] ? down_write+0xb2/0x120 [ 170.061515][ T6870] __generic_file_write_iter+0x24b/0x480 [ 170.067140][ T6870] ? generic_write_checks+0x3d4/0x480 [ 170.072495][ T6870] generic_file_write_iter+0xa9/0x1d0 [ 170.077851][ T6870] __kernel_write+0x535/0x910 [ 170.082509][ T6870] ? vfs_read+0xa60/0xa60 [ 170.086827][ T6870] ? populate_vma_page_range+0xf0/0xf0 [ 170.092275][ T6870] ? cgroup_freezing+0x86/0xb0 [ 170.097025][ T6870] ? freezing_slow_path+0x10a/0x150 [ 170.102213][ T6870] dump_emit+0x246/0x370 [ 170.106447][ T6870] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 170.111893][ T6870] dump_user_range+0x6a/0x1a0 [ 170.116552][ T6870] elf_core_dump+0x2866/0x2cc0 [ 170.121301][ T6870] ? load_elf_binary+0x28e0/0x28e0 [ 170.126410][ T6870] ? _raw_spin_unlock+0x4d/0x70 [ 170.131249][ T6870] ? __kasan_check_write+0x14/0x20 [ 170.136348][ T6870] ? put_files_struct+0x23b/0x330 [ 170.141361][ T6870] do_coredump+0x1ba3/0x28e0 [ 170.145945][ T6870] ? simple_acl_create+0x1c0/0x1c0 [ 170.151041][ T6870] ? debug_smp_processor_id+0x17/0x20 [ 170.156403][ T6870] ? kmem_cache_free+0x100/0x2d0 [ 170.161322][ T6870] ? ____kasan_slab_free+0x130/0x160 [ 170.166592][ T6870] ? get_signal+0xb98/0x12e0 [ 170.171164][ T6870] ? kmem_cache_free+0x100/0x2d0 [ 170.176086][ T6870] get_signal+0xf23/0x12e0 [ 170.180494][ T6870] arch_do_signal_or_restart+0xe2/0x11d0 [ 170.186111][ T6870] ? __bad_area_nosemaphore+0x2b0/0x420 [ 170.191637][ T6870] ? down_read_trylock+0x106/0x160 [ 170.196730][ T6870] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 170.202344][ T6870] ? bad_area+0x6a/0x80 [ 170.206492][ T6870] exit_to_user_mode_loop+0xa2/0xe0 [ 170.211673][ T6870] exit_to_user_mode_prepare+0x76/0xa0 [ 170.217115][ T6870] irqentry_exit_to_user_mode+0x9/0x10 [ 170.222554][ T6870] irqentry_exit+0x12/0x60 [ 170.226954][ T6870] exc_page_fault+0x67/0xc0 [ 170.231437][ T6870] ? asm_exc_page_fault+0x8/0x30 [ 170.236353][ T6870] asm_exc_page_fault+0x1e/0x30 [ 170.241190][ T6870] RIP: 0033:0x7f37c67fc7a1 [ 170.245587][ T6870] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 170.265173][ T6870] RSP: 002b:00000000fffffeb0 EFLAGS: 00010217 [ 170.271227][ T6870] RAX: 0000000000000000 RBX: 00007f37c6a75fa0 RCX: 00007f37c67fc799 [ 170.279181][ T6870] RDX: 0000000000000000 RSI: 00000000fffffeb0 RDI: 0000000002000400 [ 170.287136][ T6870] RBP: 00007f37c6892c99 R08: 0000000000000000 R09: 0000000000000000 [ 170.295093][ T6870] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 170.303052][ T6870] R13: 00007f37c6a76038 R14: 00007f37c6a75fa0 R15: 00007ffe18a64048 [ 170.374901][ T6870] memory: usage 307048kB, limit 307200kB, failcnt 10961 [ 170.382937][ T6870] memory+swap: usage 415916kB, limit 9007199254740988kB, failcnt 0 [ 170.393163][ T6870] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 170.408377][ T6870] Memory cgroup stats for /syz3: [ 170.409652][ T6870] anon 135168 [ 170.409652][ T6870] file 297639936 [ 170.409652][ T6870] kernel_stack 0 [ 170.409652][ T6870] percpu 0 [ 170.409652][ T6870] sock 0 [ 170.409652][ T6870] shmem 297639936 [ 170.409652][ T6870] file_mapped 0 [ 170.409652][ T6870] file_dirty 0 [ 170.409652][ T6870] file_writeback 0 [ 170.409652][ T6870] anon_thp 0 [ 170.409652][ T6870] inactive_anon 313458688 [ 170.409652][ T6870] active_anon 811008 [ 170.409652][ T6870] inactive_file 4096 [ 170.409652][ T6870] active_file 143360 [ 170.409652][ T6870] unevictable 0 [ 170.409652][ T6870] slab_reclaimable 0 [ 170.409652][ T6870] slab_unreclaimable 0 [ 170.409652][ T6870] slab 0 [ 170.409652][ T6870] workingset_refault_anon 0 [ 170.409652][ T6870] workingset_refault_file 1518 [ 170.409652][ T6870] workingset_activate_anon 0 [ 170.409652][ T6870] workingset_activate_file 1155 [ 170.409652][ T6870] workingset_restore_anon 0 [ 170.409652][ T6870] workingset_restore_file 1155 [ 170.669738][ T6870] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.1843,pid=6845,uid=0 [ 170.742221][ T6870] Memory cgroup out of memory: Killed process 6845 (syz.3.1843) total-vm:90444kB, anon-rss:1256kB, file-rss:53360kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 172.126693][ T6833] syz.3.1843 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 172.282643][ T6833] CPU: 1 PID: 6833 Comm: syz.3.1843 Tainted: G W syzkaller #0 [ 172.291423][ T6833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 172.301460][ T6833] Call Trace: [ 172.304735][ T6833] __dump_stack+0x21/0x24 [ 172.309048][ T6833] dump_stack_lvl+0x1a7/0x208 [ 172.313712][ T6833] ? show_regs_print_info+0x18/0x18 [ 172.318892][ T6833] ? ___ratelimit+0x3de/0x560 [ 172.323551][ T6833] ? __kasan_check_write+0x14/0x20 [ 172.328648][ T6833] ? _raw_spin_lock+0x94/0xf0 [ 172.333317][ T6833] dump_stack+0x15/0x1c [ 172.337459][ T6833] dump_header+0xdd/0x650 [ 172.341774][ T6833] oom_kill_process+0x1fa/0x2c0 [ 172.346610][ T6833] out_of_memory+0x93f/0xd20 [ 172.351189][ T6833] ? unregister_oom_notifier+0x20/0x20 [ 172.356629][ T6833] ? mutex_lock_killable+0x92/0xf0 [ 172.361724][ T6833] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 172.368220][ T6833] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 172.373755][ T6833] ? mem_cgroup_oom_trylock+0x350/0x350 [ 172.379284][ T6833] ? _raw_spin_trylock_bh+0x150/0x150 [ 172.384639][ T6833] ? _raw_spin_unlock+0x4d/0x70 [ 172.389478][ T6833] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 172.395005][ T6833] try_charge+0xf69/0x1500 [ 172.399411][ T6833] ? __memcg_kmem_charge+0x150/0x150 [ 172.404678][ T6833] ? percpu_counter_add_batch+0x13c/0x160 [ 172.410388][ T6833] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 172.415915][ T6833] __mem_cgroup_charge+0x14c/0x6d0 [ 172.421016][ T6833] shmem_add_to_page_cache+0x574/0xe30 [ 172.426460][ T6833] ? shmem_alloc_page+0x380/0x380 [ 172.431468][ T6833] ? _raw_spin_lock_irqsave+0x130/0x130 [ 172.437005][ T6833] ? find_lock_entry+0x4b/0x200 [ 172.441845][ T6833] shmem_getpage_gfp+0x8eb/0x2120 [ 172.446860][ T6833] shmem_write_begin+0xce/0x1b0 [ 172.451695][ T6833] generic_perform_write+0x2ce/0x540 [ 172.456962][ T6833] ? atime_needs_update+0x5b0/0x5b0 [ 172.462146][ T6833] ? grab_cache_page_write_begin+0xb0/0xb0 [ 172.467936][ T6833] ? file_remove_privs+0x5b0/0x5b0 [ 172.473032][ T6833] ? __kasan_check_write+0x14/0x20 [ 172.478136][ T6833] ? down_write+0xb2/0x120 [ 172.482541][ T6833] __generic_file_write_iter+0x24b/0x480 [ 172.488159][ T6833] ? generic_write_checks+0x3d4/0x480 [ 172.493514][ T6833] generic_file_write_iter+0xa9/0x1d0 [ 172.498864][ T6833] __kernel_write+0x535/0x910 [ 172.503523][ T6833] ? vfs_read+0xa60/0xa60 [ 172.507831][ T6833] ? populate_vma_page_range+0xf0/0xf0 [ 172.513276][ T6833] ? cgroup_freezing+0x86/0xb0 [ 172.518035][ T6833] ? freezing_slow_path+0x10a/0x150 [ 172.523223][ T6833] dump_emit+0x246/0x370 [ 172.527447][ T6833] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 172.532892][ T6833] dump_user_range+0x6a/0x1a0 [ 172.537556][ T6833] elf_core_dump+0x2866/0x2cc0 [ 172.542308][ T6833] ? load_elf_binary+0x28e0/0x28e0 [ 172.547423][ T6833] ? _raw_spin_unlock+0x4d/0x70 [ 172.552268][ T6833] ? __kasan_check_write+0x14/0x20 [ 172.557367][ T6833] ? put_files_struct+0x23b/0x330 [ 172.562385][ T6833] do_coredump+0x1ba3/0x28e0 [ 172.566965][ T6833] ? simple_acl_create+0x1c0/0x1c0 [ 172.572058][ T6833] ? debug_smp_processor_id+0x17/0x20 [ 172.577410][ T6833] ? kmem_cache_free+0x100/0x2d0 [ 172.582330][ T6833] ? ____kasan_slab_free+0x130/0x160 [ 172.587600][ T6833] ? get_signal+0xb98/0x12e0 [ 172.592175][ T6833] ? kmem_cache_free+0x100/0x2d0 [ 172.597101][ T6833] get_signal+0xf23/0x12e0 [ 172.601498][ T6833] arch_do_signal_or_restart+0xe2/0x11d0 [ 172.607105][ T6833] ? __bad_area_nosemaphore+0x2b0/0x420 [ 172.612621][ T6833] ? down_read_trylock+0x106/0x160 [ 172.617705][ T6833] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 172.623311][ T6833] ? bad_area+0x6a/0x80 [ 172.627444][ T6833] exit_to_user_mode_loop+0xa2/0xe0 [ 172.632613][ T6833] exit_to_user_mode_prepare+0x76/0xa0 [ 172.638046][ T6833] irqentry_exit_to_user_mode+0x9/0x10 [ 172.643474][ T6833] irqentry_exit+0x12/0x60 [ 172.647866][ T6833] exc_page_fault+0x67/0xc0 [ 172.652341][ T6833] ? asm_exc_page_fault+0x8/0x30 [ 172.657247][ T6833] asm_exc_page_fault+0x1e/0x30 [ 172.662096][ T6833] RIP: 0033:0x7f37c67fc7a1 [ 172.666484][ T6833] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 172.686061][ T6833] RSP: 002b:00000000fffffeb0 EFLAGS: 00010217 [ 172.692101][ T6833] RAX: 0000000000000000 RBX: 00007f37c6a75fa0 RCX: 00007f37c67fc799 [ 172.700046][ T6833] RDX: 0000000000000000 RSI: 00000000fffffeb0 RDI: 0000000002000400 [ 172.707992][ T6833] RBP: 00007f37c6892c99 R08: 0000000000000000 R09: 0000000000000000 [ 172.715937][ T6833] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 172.723881][ T6833] R13: 00007f37c6a76038 R14: 00007f37c6a75fa0 R15: 00007ffe18a64048 [ 172.734730][ T6833] memory: usage 307200kB, limit 307200kB, failcnt 13915 [ 172.803610][ T6833] memory+swap: usage 424904kB, limit 9007199254740988kB, failcnt 0 [ 172.869263][ T6833] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 172.888336][ T6833] Memory cgroup stats for /syz3: [ 172.888448][ T6833] anon 270336 [ 172.888448][ T6833] file 311967744 [ 172.888448][ T6833] kernel_stack 0 [ 172.888448][ T6833] percpu 0 [ 172.888448][ T6833] sock 0 [ 172.888448][ T6833] shmem 310886400 [ 172.888448][ T6833] file_mapped 946176 [ 172.888448][ T6833] file_dirty 0 [ 172.888448][ T6833] file_writeback 0 [ 172.888448][ T6833] anon_thp 0 [ 172.888448][ T6833] inactive_anon 312352768 [ 172.888448][ T6833] active_anon 811008 [ 172.888448][ T6833] inactive_file 696320 [ 172.888448][ T6833] active_file 638976 [ 172.888448][ T6833] unevictable 0 [ 172.888448][ T6833] slab_reclaimable 0 [ 172.888448][ T6833] slab_unreclaimable 0 [ 172.888448][ T6833] slab 0 [ 172.888448][ T6833] workingset_refault_anon 0 [ 172.888448][ T6833] workingset_refault_file 3333 [ 172.888448][ T6833] workingset_activate_anon 0 [ 172.888448][ T6833] workingset_activate_file 2343 [ 172.888448][ T6833] workingset_restore_anon 0 [ 172.888448][ T6833] workingset_restore_file 2013 [ 172.989361][ T6833] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.1843,pid=6831,uid=0 [ 173.004720][ T7117] : renamed from team_slave_1 [ 173.046018][ T6833] Memory cgroup out of memory: Killed process 6831 (syz.3.1843) total-vm:90312kB, anon-rss:1256kB, file-rss:53424kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 173.144478][ T27] oom_reaper: reaped process 6831 (syz.3.1843), now anon-rss:0kB, file-rss:53360kB, shmem-rss:0kB [ 173.157563][ T6833] syz.3.1843 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 173.177548][ T6833] CPU: 0 PID: 6833 Comm: syz.3.1843 Tainted: G W syzkaller #0 [ 173.186318][ T6833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 173.196363][ T6833] Call Trace: [ 173.199645][ T6833] __dump_stack+0x21/0x24 [ 173.203965][ T6833] dump_stack_lvl+0x1a7/0x208 [ 173.208627][ T6833] ? show_regs_print_info+0x18/0x18 [ 173.213812][ T6833] ? ___ratelimit+0x3de/0x560 [ 173.218475][ T6833] ? __kasan_check_write+0x14/0x20 [ 173.223571][ T6833] ? _raw_spin_lock+0x94/0xf0 [ 173.228232][ T6833] dump_stack+0x15/0x1c [ 173.232387][ T6833] dump_header+0xdd/0x650 [ 173.236701][ T6833] oom_kill_process+0x1fa/0x2c0 [ 173.241534][ T6833] out_of_memory+0x93f/0xd20 [ 173.246113][ T6833] ? unregister_oom_notifier+0x20/0x20 [ 173.251555][ T6833] ? mutex_lock_killable+0xdf/0xf0 [ 173.256650][ T6833] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 173.263148][ T6833] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 173.268681][ T6833] ? mem_cgroup_oom_trylock+0x350/0x350 [ 173.274217][ T6833] ? _raw_spin_trylock_bh+0x150/0x150 [ 173.279578][ T6833] ? _raw_spin_unlock+0x4d/0x70 [ 173.284421][ T6833] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 173.289955][ T6833] try_charge+0xf69/0x1500 [ 173.294362][ T6833] ? __memcg_kmem_charge+0x150/0x150 [ 173.299631][ T6833] ? percpu_counter_add_batch+0x13c/0x160 [ 173.305342][ T6833] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 173.310889][ T6833] __mem_cgroup_charge+0x14c/0x6d0 [ 173.315990][ T6833] shmem_add_to_page_cache+0x574/0xe30 [ 173.321441][ T6833] ? shmem_alloc_page+0x380/0x380 [ 173.326458][ T6833] ? _raw_spin_lock_irqsave+0x130/0x130 [ 173.332020][ T6833] ? find_lock_entry+0x4b/0x200 [ 173.336853][ T6833] shmem_getpage_gfp+0x8eb/0x2120 [ 173.341869][ T6833] shmem_write_begin+0xce/0x1b0 [ 173.346703][ T6833] generic_perform_write+0x2ce/0x540 [ 173.351974][ T6833] ? atime_needs_update+0x5b0/0x5b0 [ 173.357161][ T6833] ? grab_cache_page_write_begin+0xb0/0xb0 [ 173.362960][ T6833] ? file_remove_privs+0x5b0/0x5b0 [ 173.368056][ T6833] ? __kasan_check_write+0x14/0x20 [ 173.373156][ T6833] ? down_write+0xb2/0x120 [ 173.377560][ T6833] __generic_file_write_iter+0x24b/0x480 [ 173.383179][ T6833] ? generic_write_checks+0x3d4/0x480 [ 173.388535][ T6833] generic_file_write_iter+0xa9/0x1d0 [ 173.393888][ T6833] __kernel_write+0x535/0x910 [ 173.398552][ T6833] ? vfs_read+0xa60/0xa60 [ 173.402867][ T6833] ? populate_vma_page_range+0xf0/0xf0 [ 173.408314][ T6833] ? cgroup_freezing+0x86/0xb0 [ 173.413072][ T6833] ? freezing_slow_path+0x10a/0x150 [ 173.418253][ T6833] dump_emit+0x246/0x370 [ 173.422571][ T6833] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 173.428016][ T6833] dump_user_range+0x6a/0x1a0 [ 173.432682][ T6833] elf_core_dump+0x2866/0x2cc0 [ 173.437434][ T6833] ? load_elf_binary+0x28e0/0x28e0 [ 173.442558][ T6833] ? _raw_spin_unlock+0x4d/0x70 [ 173.447408][ T6833] ? __kasan_check_write+0x14/0x20 [ 173.452515][ T6833] ? put_files_struct+0x23b/0x330 [ 173.457530][ T6833] do_coredump+0x1ba3/0x28e0 [ 173.462117][ T6833] ? simple_acl_create+0x1c0/0x1c0 [ 173.467222][ T6833] ? debug_smp_processor_id+0x17/0x20 [ 173.472586][ T6833] ? kmem_cache_free+0x100/0x2d0 [ 173.477507][ T6833] ? ____kasan_slab_free+0x130/0x160 [ 173.482783][ T6833] ? get_signal+0xb98/0x12e0 [ 173.487360][ T6833] ? kmem_cache_free+0x100/0x2d0 [ 173.492287][ T6833] get_signal+0xf23/0x12e0 [ 173.496695][ T6833] arch_do_signal_or_restart+0xe2/0x11d0 [ 173.502315][ T6833] ? __bad_area_nosemaphore+0x2b0/0x420 [ 173.507846][ T6833] ? down_read_trylock+0x106/0x160 [ 173.512940][ T6833] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 173.518549][ T6833] ? bad_area+0x6a/0x80 [ 173.522693][ T6833] exit_to_user_mode_loop+0xa2/0xe0 [ 173.527876][ T6833] exit_to_user_mode_prepare+0x76/0xa0 [ 173.533366][ T6833] irqentry_exit_to_user_mode+0x9/0x10 [ 173.538809][ T6833] irqentry_exit+0x12/0x60 [ 173.543208][ T6833] exc_page_fault+0x67/0xc0 [ 173.547696][ T6833] ? asm_exc_page_fault+0x8/0x30 [ 173.552621][ T6833] asm_exc_page_fault+0x1e/0x30 [ 173.557450][ T6833] RIP: 0033:0x7f37c67fc7a1 [ 173.561849][ T6833] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 173.581441][ T6833] RSP: 002b:00000000fffffeb0 EFLAGS: 00010217 [ 173.587495][ T6833] RAX: 0000000000000000 RBX: 00007f37c6a75fa0 RCX: 00007f37c67fc799 [ 173.595453][ T6833] RDX: 0000000000000000 RSI: 00000000fffffeb0 RDI: 0000000002000400 [ 173.603410][ T6833] RBP: 00007f37c6892c99 R08: 0000000000000000 R09: 0000000000000000 [ 173.611367][ T6833] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 173.619323][ T6833] R13: 00007f37c6a76038 R14: 00007f37c6a75fa0 R15: 00007ffe18a64048 [ 173.627450][ T6833] memory: usage 285676kB, limit 307200kB, failcnt 15582 [ 173.682355][ T6833] memory+swap: usage 388080kB, limit 9007199254740988kB, failcnt 0 [ 173.698619][ T6833] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 173.706326][ T6833] Memory cgroup stats for /syz3: [ 173.706762][ T6833] anon 270336 [ 173.706762][ T6833] file 282501120 [ 173.706762][ T6833] kernel_stack 0 [ 173.706762][ T6833] percpu 0 [ 173.706762][ T6833] sock 0 [ 173.706762][ T6833] shmem 282501120 [ 173.706762][ T6833] file_mapped 135168 [ 173.706762][ T6833] file_dirty 0 [ 173.706762][ T6833] file_writeback 0 [ 173.706762][ T6833] anon_thp 0 [ 173.706762][ T6833] inactive_anon 283832320 [ 173.706762][ T6833] active_anon 811008 [ 173.706762][ T6833] inactive_file 122880 [ 173.706762][ T6833] active_file 159744 [ 173.706762][ T6833] unevictable 0 [ 173.706762][ T6833] slab_reclaimable 0 [ 173.706762][ T6833] slab_unreclaimable 0 [ 173.706762][ T6833] slab 0 [ 173.706762][ T6833] workingset_refault_anon 0 [ 173.706762][ T6833] workingset_refault_file 4323 [ 173.706762][ T6833] workingset_activate_anon 0 [ 173.706762][ T6833] workingset_activate_file 2673 [ 173.706762][ T6833] workingset_restore_anon 0 [ 173.706762][ T6833] workingset_restore_file 2145 [ 173.801374][ T6833] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.1843,pid=6868,uid=0 [ 173.816299][ T6833] Memory cgroup out of memory: Killed process 6868 (syz.3.1843) total-vm:90444kB, anon-rss:1256kB, file-rss:53088kB, shmem-rss:0kB, UID:0 pgtables:188kB oom_score_adj:1000 [ 174.847893][ T7164] : port 1(vlan1) entered blocking state [ 174.899592][ T7164] : port 1(vlan1) entered disabled state [ 174.911880][ T7164] device vlan1 entered promiscuous mode [ 175.486703][ T7159] device wg2 entered promiscuous mode [ 175.921684][ T7182] device wg2 left promiscuous mode [ 176.275157][ T6835] syz.3.1843 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 176.285065][ T6835] CPU: 0 PID: 6835 Comm: syz.3.1843 Tainted: G W syzkaller #0 [ 176.293812][ T6835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 176.303858][ T6835] Call Trace: [ 176.307142][ T6835] __dump_stack+0x21/0x24 [ 176.311462][ T6835] dump_stack_lvl+0x1a7/0x208 [ 176.316122][ T6835] ? show_regs_print_info+0x18/0x18 [ 176.321305][ T6835] ? ___ratelimit+0x3de/0x560 [ 176.325978][ T6835] ? _raw_spin_lock+0x94/0xf0 [ 176.330645][ T6835] dump_stack+0x15/0x1c [ 176.334787][ T6835] dump_header+0xdd/0x650 [ 176.339102][ T6835] oom_kill_process+0x1fa/0x2c0 [ 176.343936][ T6835] out_of_memory+0x93f/0xd20 [ 176.348512][ T6835] ? unregister_oom_notifier+0x20/0x20 [ 176.353970][ T6835] ? mutex_lock_killable+0x92/0xf0 [ 176.359076][ T6835] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 176.365568][ T6835] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 176.371088][ T6835] ? mem_cgroup_oom_trylock+0x350/0x350 [ 176.376606][ T6835] ? _raw_spin_trylock_bh+0x150/0x150 [ 176.381956][ T6835] ? _raw_spin_unlock+0x4d/0x70 [ 176.386782][ T6835] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 176.392297][ T6835] try_charge+0xf69/0x1500 [ 176.396691][ T6835] ? __memcg_kmem_charge+0x150/0x150 [ 176.401953][ T6835] ? percpu_counter_add_batch+0x13c/0x160 [ 176.407646][ T6835] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 176.413164][ T6835] __mem_cgroup_charge+0x14c/0x6d0 [ 176.418246][ T6835] shmem_add_to_page_cache+0x574/0xe30 [ 176.423678][ T6835] ? shmem_alloc_page+0x380/0x380 [ 176.428678][ T6835] ? _raw_spin_lock_irqsave+0x130/0x130 [ 176.434200][ T6835] ? find_lock_entry+0x4b/0x200 [ 176.439023][ T6835] shmem_getpage_gfp+0x8eb/0x2120 [ 176.444024][ T6835] shmem_write_begin+0xce/0x1b0 [ 176.448844][ T6835] generic_perform_write+0x2ce/0x540 [ 176.454102][ T6835] ? atime_needs_update+0x5b0/0x5b0 [ 176.459273][ T6835] ? grab_cache_page_write_begin+0xb0/0xb0 [ 176.465048][ T6835] ? file_remove_privs+0x5b0/0x5b0 [ 176.470130][ T6835] ? __kasan_check_write+0x14/0x20 [ 176.475210][ T6835] ? down_write+0xb2/0x120 [ 176.479600][ T6835] __generic_file_write_iter+0x24b/0x480 [ 176.485205][ T6835] ? generic_write_checks+0x3d4/0x480 [ 176.490549][ T6835] generic_file_write_iter+0xa9/0x1d0 [ 176.495890][ T6835] __kernel_write+0x535/0x910 [ 176.500605][ T6835] ? vfs_read+0xa60/0xa60 [ 176.504907][ T6835] ? populate_vma_page_range+0xf0/0xf0 [ 176.510337][ T6835] ? kasan_check_range+0x11/0x2a0 [ 176.515335][ T6835] ? cgroup_freezing+0x86/0xb0 [ 176.520071][ T6835] ? freezing_slow_path+0x10a/0x150 [ 176.525240][ T6835] dump_emit+0x246/0x370 [ 176.529454][ T6835] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 176.534884][ T6835] dump_user_range+0x6a/0x1a0 [ 176.539533][ T6835] elf_core_dump+0x2866/0x2cc0 [ 176.544270][ T6835] ? load_elf_binary+0x28e0/0x28e0 [ 176.549362][ T6835] ? _raw_spin_unlock+0x4d/0x70 [ 176.554188][ T6835] ? __kasan_check_write+0x14/0x20 [ 176.559268][ T6835] ? put_files_struct+0x23b/0x330 [ 176.564266][ T6835] do_coredump+0x1ba3/0x28e0 [ 176.568833][ T6835] ? simple_acl_create+0x1c0/0x1c0 [ 176.573914][ T6835] ? debug_smp_processor_id+0x17/0x20 [ 176.579259][ T6835] ? kmem_cache_free+0x100/0x2d0 [ 176.584166][ T6835] ? ____kasan_slab_free+0x130/0x160 [ 176.589425][ T6835] ? get_signal+0xb98/0x12e0 [ 176.593989][ T6835] ? kmem_cache_free+0x100/0x2d0 [ 176.598900][ T6835] get_signal+0xf23/0x12e0 [ 176.603293][ T6835] arch_do_signal_or_restart+0xe2/0x11d0 [ 176.608899][ T6835] ? __bad_area_nosemaphore+0x2b0/0x420 [ 176.614414][ T6835] ? down_read_trylock+0x106/0x160 [ 176.619501][ T6835] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 176.625103][ T6835] ? bad_area+0x6a/0x80 [ 176.629236][ T6835] exit_to_user_mode_loop+0xa2/0xe0 [ 176.634406][ T6835] exit_to_user_mode_prepare+0x76/0xa0 [ 176.639838][ T6835] irqentry_exit_to_user_mode+0x9/0x10 [ 176.645266][ T6835] irqentry_exit+0x12/0x60 [ 176.649651][ T6835] exc_page_fault+0x67/0xc0 [ 176.654128][ T6835] ? asm_exc_page_fault+0x8/0x30 [ 176.659032][ T6835] asm_exc_page_fault+0x1e/0x30 [ 176.663854][ T6835] RIP: 0033:0x7f37c67fc7a1 [ 176.668242][ T6835] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 176.687817][ T6835] RSP: 002b:00000000fffffeb0 EFLAGS: 00010217 [ 176.693857][ T6835] RAX: 0000000000000000 RBX: 00007f37c6a75fa0 RCX: 00007f37c67fc799 [ 176.701802][ T6835] RDX: 0000000000000000 RSI: 00000000fffffeb0 RDI: 0000000002000400 [ 176.709743][ T6835] RBP: 00007f37c6892c99 R08: 0000000000000000 R09: 0000000000000000 [ 176.717690][ T6835] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 176.725632][ T6835] R13: 00007f37c6a76038 R14: 00007f37c6a75fa0 R15: 00007ffe18a64048 [ 176.737984][ T6835] memory: usage 307200kB, limit 307200kB, failcnt 18380 [ 176.745245][ T6835] memory+swap: usage 429412kB, limit 9007199254740988kB, failcnt 0 [ 176.808889][ T6835] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 176.867129][ T6835] Memory cgroup stats for /syz3: [ 176.867240][ T6835] anon 405504 [ 176.867240][ T6835] file 311291904 [ 176.867240][ T6835] kernel_stack 0 [ 176.867240][ T6835] percpu 0 [ 176.867240][ T6835] sock 0 [ 176.867240][ T6835] shmem 311156736 [ 176.867240][ T6835] file_mapped 135168 [ 176.867240][ T6835] file_dirty 0 [ 176.867240][ T6835] file_writeback 0 [ 176.867240][ T6835] anon_thp 0 [ 176.867240][ T6835] inactive_anon 312950784 [ 176.867240][ T6835] active_anon 1351680 [ 176.867240][ T6835] inactive_file 4096 [ 176.867240][ T6835] active_file 28672 [ 176.867240][ T6835] unevictable 0 [ 176.867240][ T6835] slab_reclaimable 0 [ 176.867240][ T6835] slab_unreclaimable 0 [ 176.867240][ T6835] slab 0 [ 176.867240][ T6835] workingset_refault_anon 66 [ 176.867240][ T6835] workingset_refault_file 5412 [ 176.867240][ T6835] workingset_activate_anon 0 [ 176.867240][ T6835] workingset_activate_file 3729 [ 176.867240][ T6835] workingset_restore_anon 0 [ 176.867240][ T6835] workingset_restore_file 3003 [ 176.961072][ T6835] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.1843,pid=6870,uid=0 [ 176.976139][ T6835] Memory cgroup out of memory: Killed process 6870 (syz.3.1843) total-vm:90444kB, anon-rss:1292kB, file-rss:53440kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 177.044221][ T7179] syz.3.1942 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 177.287929][ T7179] CPU: 1 PID: 7179 Comm: syz.3.1942 Tainted: G W syzkaller #0 [ 177.296714][ T7179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 177.306757][ T7179] Call Trace: [ 177.310037][ T7179] __dump_stack+0x21/0x24 [ 177.314348][ T7179] dump_stack_lvl+0x1a7/0x208 [ 177.319014][ T7179] ? show_regs_print_info+0x18/0x18 [ 177.324195][ T7179] ? ___ratelimit+0x3de/0x560 [ 177.328862][ T7179] ? __kasan_check_write+0x14/0x20 [ 177.333963][ T7179] ? _raw_spin_lock+0x94/0xf0 [ 177.338639][ T7179] dump_stack+0x15/0x1c [ 177.342783][ T7179] dump_header+0xdd/0x650 [ 177.347101][ T7179] oom_kill_process+0x1fa/0x2c0 [ 177.351942][ T7179] out_of_memory+0x93f/0xd20 [ 177.356514][ T7179] ? sched_clock+0x3a/0x40 [ 177.360919][ T7179] ? unregister_oom_notifier+0x20/0x20 [ 177.366358][ T7179] ? mutex_lock_killable+0xdf/0xf0 [ 177.371460][ T7179] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 177.377946][ T7179] ? __irq_exit_rcu+0x40/0x150 [ 177.382705][ T7179] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 177.388237][ T7179] ? mem_cgroup_oom_trylock+0x350/0x350 [ 177.393768][ T7179] ? _raw_spin_trylock_bh+0x150/0x150 [ 177.399130][ T7179] ? _raw_spin_unlock+0x4d/0x70 [ 177.403965][ T7179] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 177.409495][ T7179] try_charge+0xf69/0x1500 [ 177.413904][ T7179] ? __memcg_kmem_charge+0x150/0x150 [ 177.419170][ T7179] ? percpu_counter_add_batch+0x13c/0x160 [ 177.424880][ T7179] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 177.430413][ T7179] __mem_cgroup_charge+0x14c/0x6d0 [ 177.435512][ T7179] shmem_add_to_page_cache+0x574/0xe30 [ 177.440957][ T7179] ? shmem_alloc_page+0x380/0x380 [ 177.445969][ T7179] ? find_lock_entry+0x4b/0x200 [ 177.450801][ T7179] shmem_getpage_gfp+0x8eb/0x2120 [ 177.455820][ T7179] shmem_write_begin+0xce/0x1b0 [ 177.460661][ T7179] generic_perform_write+0x2ce/0x540 [ 177.465934][ T7179] ? atime_needs_update+0x5b0/0x5b0 [ 177.471123][ T7179] ? grab_cache_page_write_begin+0xb0/0xb0 [ 177.476999][ T7179] ? file_remove_privs+0x5b0/0x5b0 [ 177.482095][ T7179] ? __kasan_check_write+0x14/0x20 [ 177.487187][ T7179] ? down_write+0xb2/0x120 [ 177.491588][ T7179] __generic_file_write_iter+0x24b/0x480 [ 177.497202][ T7179] ? generic_write_checks+0x3b3/0x480 [ 177.502561][ T7179] generic_file_write_iter+0xa9/0x1d0 [ 177.507917][ T7179] vfs_write+0x758/0xdc0 [ 177.512144][ T7179] ? kernel_write+0x3c0/0x3c0 [ 177.516808][ T7179] ? mutex_trylock+0xa0/0xa0 [ 177.521379][ T7179] ? __fget_files+0x2c4/0x320 [ 177.526126][ T7179] ? __fdget_pos+0x2d2/0x380 [ 177.530696][ T7179] ? ksys_write+0x71/0x250 [ 177.535098][ T7179] ksys_write+0x149/0x250 [ 177.539411][ T7179] ? __ia32_sys_read+0x90/0x90 [ 177.544160][ T7179] ? __kasan_check_read+0x11/0x20 [ 177.549168][ T7179] __x64_sys_write+0x7b/0x90 [ 177.553751][ T7179] do_syscall_64+0x31/0x40 [ 177.558152][ T7179] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 177.564028][ T7179] RIP: 0033:0x7f37c67fc799 [ 177.568426][ T7179] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 177.588019][ T7179] RSP: 002b:00007f37c5257028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 177.596417][ T7179] RAX: ffffffffffffffda RBX: 00007f37c6a75fa0 RCX: 00007f37c67fc799 [ 177.604372][ T7179] RDX: 00000000fffffdef RSI: 0000200000000140 RDI: 000000000000000b [ 177.612330][ T7179] RBP: 00007f37c6892c99 R08: 0000000000000000 R09: 0000000000000000 [ 177.620286][ T7179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 177.628244][ T7179] R13: 00007f37c6a76038 R14: 00007f37c6a75fa0 R15: 00007ffe18a64048 [ 177.988104][ T7179] memory: usage 307136kB, limit 307200kB, failcnt 19494 [ 177.996213][ T7179] memory+swap: usage 425720kB, limit 9007199254740988kB, failcnt 0 [ 178.047272][ T24] audit: type=1400 audit(1773268398.099:166): avc: denied { create } for pid=7246 comm="syz.0.1959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 178.059791][ T7247] device veth1_macvtap left promiscuous mode [ 178.083484][ T7247] device macsec0 left promiscuous mode [ 178.100646][ T7251] device veth1_macvtap entered promiscuous mode [ 178.130290][ T7251] device macsec0 entered promiscuous mode [ 178.136818][ T7179] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 178.204064][ T7179] Memory cgroup stats for /syz3: [ 178.204259][ T7179] anon 405504 [ 178.204259][ T7179] file 306155520 [ 178.204259][ T7179] kernel_stack 0 [ 178.204259][ T7179] percpu 0 [ 178.204259][ T7179] sock 0 [ 178.204259][ T7179] shmem 306155520 [ 178.204259][ T7179] file_mapped 135168 [ 178.204259][ T7179] file_dirty 0 [ 178.204259][ T7179] file_writeback 135168 [ 178.204259][ T7179] anon_thp 0 [ 178.204259][ T7179] inactive_anon 307724288 [ 178.204259][ T7179] active_anon 1486848 [ 178.204259][ T7179] inactive_file 139264 [ 178.204259][ T7179] active_file 28672 [ 178.204259][ T7179] unevictable 0 [ 178.204259][ T7179] slab_reclaimable 0 [ 178.204259][ T7179] slab_unreclaimable 0 [ 178.204259][ T7179] slab 0 [ 178.204259][ T7179] workingset_refault_anon 66 [ 178.204259][ T7179] workingset_refault_file 5445 [ 178.204259][ T7179] workingset_activate_anon 0 [ 178.204259][ T7179] workingset_activate_file 3729 [ 178.204259][ T7179] workingset_restore_anon 0 [ 178.204259][ T7179] workingset_restore_file 3003 [ 178.433652][ T7179] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.1843,pid=6841,uid=0 [ 178.449074][ T7179] Memory cgroup out of memory: Killed process 6841 (syz.3.1843) total-vm:90444kB, anon-rss:1280kB, file-rss:53440kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 179.170243][ T275] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 179.205243][ T275] CPU: 0 PID: 275 Comm: syz-executor Tainted: G W syzkaller #0 [ 179.214111][ T275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 179.224163][ T275] Call Trace: [ 179.227453][ T275] __dump_stack+0x21/0x24 [ 179.231779][ T275] dump_stack_lvl+0x1a7/0x208 [ 179.236461][ T275] ? show_regs_print_info+0x18/0x18 [ 179.241656][ T275] ? ___ratelimit+0x3de/0x560 [ 179.246337][ T275] ? __kasan_check_write+0x14/0x20 [ 179.251449][ T275] ? _raw_spin_lock+0x94/0xf0 [ 179.256122][ T275] dump_stack+0x15/0x1c [ 179.260272][ T275] dump_header+0xdd/0x650 [ 179.264596][ T275] oom_kill_process+0x1fa/0x2c0 [ 179.269436][ T275] out_of_memory+0x93f/0xd20 [ 179.274018][ T275] ? unregister_oom_notifier+0x20/0x20 [ 179.279473][ T275] ? mutex_lock_killable+0x92/0xf0 [ 179.284577][ T275] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 179.291074][ T275] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 179.296611][ T275] ? mem_cgroup_oom_trylock+0x350/0x350 [ 179.302157][ T275] ? _raw_spin_trylock_bh+0x150/0x150 [ 179.307526][ T275] ? _raw_spin_unlock+0x4d/0x70 [ 179.312370][ T275] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 179.317915][ T275] try_charge+0xf69/0x1500 [ 179.322334][ T275] ? __memcg_kmem_charge+0x150/0x150 [ 179.327615][ T275] ? get_page_from_freelist+0x223b/0x23d0 [ 179.333332][ T275] ? _raw_spin_trylock+0xb7/0x150 [ 179.338351][ T275] ? read_pages+0x643/0xb60 [ 179.342853][ T275] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 179.348400][ T275] __mem_cgroup_charge+0x14c/0x6d0 [ 179.353599][ T275] __add_to_page_cache_locked+0x1fe/0x9a0 [ 179.359325][ T275] ? __alloc_pages_nodemask+0x290/0x620 [ 179.364872][ T275] ? put_page+0xd0/0xd0 [ 179.369027][ T275] ? workingset_activation+0x250/0x250 [ 179.374481][ T275] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 179.380022][ T275] ? find_get_entry+0x37b/0x3e0 [ 179.384871][ T275] ? page_cache_prev_miss+0x1b0/0x290 [ 179.390250][ T275] add_to_page_cache_lru+0xa7/0x210 [ 179.395445][ T275] pagecache_get_page+0x700/0x930 [ 179.400469][ T275] filemap_fault+0x1b51/0x20d0 [ 179.405217][ T275] ? generic_file_read_iter+0x5c0/0x5c0 [ 179.410758][ T275] ? wait_consider_task+0x1af1/0x27d0 [ 179.416128][ T275] ? filemap_allow_speculation+0x10/0x10 [ 179.421754][ T275] ? __kasan_check_write+0x14/0x20 [ 179.426862][ T275] ext4_filemap_fault+0x8a/0xa0 [ 179.431709][ T275] handle_pte_fault+0x1fa5/0x3750 [ 179.436730][ T275] handle_mm_fault+0xf81/0x1710 [ 179.441574][ T275] ? can_reuse_spf_vma+0xe0/0xe0 [ 179.446493][ T275] ? kernel_wait4+0x22a/0x2a0 [ 179.451156][ T275] ? __kasan_check_write+0x14/0x20 [ 179.456241][ T275] ? down_read_trylock+0x106/0x160 [ 179.461325][ T275] ? __init_rwsem+0x1c0/0x1c0 [ 179.465974][ T275] ? find_vma+0x30/0x150 [ 179.470190][ T275] do_user_addr_fault+0x5a8/0xc90 [ 179.475189][ T275] ? do_kern_addr_fault+0x80/0x80 [ 179.480188][ T275] ? debug_smp_processor_id+0x17/0x20 [ 179.485545][ T275] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 179.491590][ T275] exc_page_fault+0x5a/0xc0 [ 179.496063][ T275] ? asm_exc_page_fault+0x8/0x30 [ 179.500971][ T275] asm_exc_page_fault+0x1e/0x30 [ 179.505797][ T275] RIP: 0033:0x7f37c66ca7b4 [ 179.510187][ T275] Code: 85 62 0a 00 00 48 b8 db 34 b6 d7 82 de 1b 43 48 f7 a4 24 98 00 00 00 48 8b 05 00 b0 ed 00 48 69 8c 24 90 00 00 00 e8 03 00 00 <8b> 78 08 48 8b 44 24 18 48 c1 ea 12 4c 8b 0d f9 ae ed 00 48 01 d1 [ 179.529763][ T275] RSP: 002b:00007ffe18a643b0 EFLAGS: 00010202 [ 179.535809][ T275] RAX: 0000001b2dd24000 RBX: 00000000000005a2 RCX: 000000000002bb38 [ 179.543756][ T275] RDX: 0000000001f1d428 RSI: 00007ffe18a64440 RDI: 00000000076b10e2 [ 179.551702][ T275] RBP: 00007ffe18a643ec R08: 00000000000000b3 R09: 0006958514974300 [ 179.559649][ T275] R10: 0000005cd05dccc8 R11: 0000000000007f72 R12: 0000000000001388 [ 179.567597][ T275] R13: 00000000000927c0 R14: 000000000002bb4a R15: 00007ffe18a64440 [ 179.598788][ T275] memory: usage 299248kB, limit 307200kB, failcnt 21517 [ 179.605811][ T275] memory+swap: usage 421420kB, limit 9007199254740988kB, failcnt 0 [ 179.633404][ T275] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 179.746254][ T275] Memory cgroup stats for /syz3: [ 179.746365][ T275] anon 270336 [ 179.746365][ T275] file 303316992 [ 179.746365][ T275] kernel_stack 0 [ 179.746365][ T275] percpu 0 [ 179.746365][ T275] sock 0 [ 179.746365][ T275] shmem 303181824 [ 179.746365][ T275] file_mapped 135168 [ 179.746365][ T275] file_dirty 0 [ 179.746365][ T275] file_writeback 0 [ 179.746365][ T275] anon_thp 0 [ 179.746365][ T275] inactive_anon 304373760 [ 179.746365][ T275] active_anon 1892352 [ 179.746365][ T275] inactive_file 0 [ 179.746365][ T275] active_file 28672 [ 179.746365][ T275] unevictable 0 [ 179.746365][ T275] slab_reclaimable 0 [ 179.746365][ T275] slab_unreclaimable 0 [ 179.746365][ T275] slab 0 [ 179.746365][ T275] workingset_refault_anon 66 [ 179.746365][ T275] workingset_refault_file 5544 [ 179.746365][ T275] workingset_activate_anon 0 [ 179.746365][ T275] workingset_activate_file 3762 [ 179.746365][ T275] workingset_restore_anon 0 [ 179.746365][ T275] workingset_restore_file 3036 [ 179.846511][ T275] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.1843,pid=6833,uid=0 [ 179.890494][ T275] Memory cgroup out of memory: Killed process 6833 (syz.3.1843) total-vm:90444kB, anon-rss:1288kB, file-rss:55168kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 179.958961][ T27] oom_reaper: reaped process 6833 (syz.3.1843), now anon-rss:0kB, file-rss:52992kB, shmem-rss:0kB [ 180.003181][ T6837] syz.3.1843 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 180.038632][ T6837] CPU: 0 PID: 6837 Comm: syz.3.1843 Tainted: G W syzkaller #0 [ 180.047412][ T6837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 180.057459][ T6837] Call Trace: [ 180.060755][ T6837] __dump_stack+0x21/0x24 [ 180.065075][ T6837] dump_stack_lvl+0x1a7/0x208 [ 180.069743][ T6837] ? show_regs_print_info+0x18/0x18 [ 180.074932][ T6837] ? ___ratelimit+0x3de/0x560 [ 180.079591][ T6837] ? __kasan_check_write+0x14/0x20 [ 180.084677][ T6837] ? _raw_spin_lock+0x94/0xf0 [ 180.089327][ T6837] dump_stack+0x15/0x1c [ 180.093453][ T6837] dump_header+0xdd/0x650 [ 180.097758][ T6837] oom_kill_process+0x1fa/0x2c0 [ 180.102584][ T6837] out_of_memory+0x93f/0xd20 [ 180.107146][ T6837] ? unregister_oom_notifier+0x20/0x20 [ 180.112574][ T6837] ? mutex_lock_killable+0xdf/0xf0 [ 180.117658][ T6837] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 180.124134][ T6837] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 180.129654][ T6837] ? mem_cgroup_oom_trylock+0x350/0x350 [ 180.135173][ T6837] ? _raw_spin_trylock_bh+0x150/0x150 [ 180.140525][ T6837] ? _raw_spin_unlock+0x4d/0x70 [ 180.145353][ T6837] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 180.150871][ T6837] try_charge+0xf69/0x1500 [ 180.155265][ T6837] ? __memcg_kmem_charge+0x150/0x150 [ 180.160521][ T6837] ? percpu_counter_add_batch+0x13c/0x160 [ 180.166215][ T6837] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 180.171745][ T6837] __mem_cgroup_charge+0x14c/0x6d0 [ 180.176829][ T6837] shmem_add_to_page_cache+0x574/0xe30 [ 180.182262][ T6837] ? shmem_alloc_page+0x380/0x380 [ 180.187259][ T6837] ? _raw_spin_lock_irqsave+0x130/0x130 [ 180.192778][ T6837] ? find_lock_entry+0x4b/0x200 [ 180.197600][ T6837] shmem_getpage_gfp+0x8eb/0x2120 [ 180.202624][ T6837] shmem_write_begin+0xce/0x1b0 [ 180.207451][ T6837] generic_perform_write+0x2ce/0x540 [ 180.212709][ T6837] ? atime_needs_update+0x5b0/0x5b0 [ 180.217882][ T6837] ? grab_cache_page_write_begin+0xb0/0xb0 [ 180.223660][ T6837] ? file_remove_privs+0x5b0/0x5b0 [ 180.228746][ T6837] ? __kasan_check_write+0x14/0x20 [ 180.233830][ T6837] ? down_write+0xb2/0x120 [ 180.238217][ T6837] __generic_file_write_iter+0x24b/0x480 [ 180.243819][ T6837] ? generic_write_checks+0x3d4/0x480 [ 180.249162][ T6837] generic_file_write_iter+0xa9/0x1d0 [ 180.254505][ T6837] __kernel_write+0x535/0x910 [ 180.259154][ T6837] ? vfs_read+0xa60/0xa60 [ 180.263459][ T6837] ? sysvec_call_function_single+0xc8/0xd0 [ 180.269235][ T6837] ? populate_vma_page_range+0xf0/0xf0 [ 180.274665][ T6837] ? cgroup_freezing+0x86/0xb0 [ 180.279399][ T6837] ? freezing_slow_path+0x10a/0x150 [ 180.284570][ T6837] dump_emit+0x246/0x370 [ 180.288786][ T6837] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 180.294218][ T6837] dump_user_range+0x6a/0x1a0 [ 180.298869][ T6837] elf_core_dump+0x2866/0x2cc0 [ 180.303607][ T6837] ? load_elf_binary+0x28e0/0x28e0 [ 180.308700][ T6837] ? _raw_spin_unlock+0x4d/0x70 [ 180.313527][ T6837] ? __kasan_check_write+0x14/0x20 [ 180.318611][ T6837] ? put_files_struct+0x23b/0x330 [ 180.323607][ T6837] do_coredump+0x1ba3/0x28e0 [ 180.328175][ T6837] ? simple_acl_create+0x1c0/0x1c0 [ 180.333257][ T6837] ? debug_smp_processor_id+0x17/0x20 [ 180.338599][ T6837] ? kmem_cache_free+0x100/0x2d0 [ 180.343506][ T6837] ? ____kasan_slab_free+0x130/0x160 [ 180.348763][ T6837] ? get_signal+0xb98/0x12e0 [ 180.353328][ T6837] ? kmem_cache_free+0x100/0x2d0 [ 180.358237][ T6837] get_signal+0xf23/0x12e0 [ 180.362630][ T6837] arch_do_signal_or_restart+0xe2/0x11d0 [ 180.368237][ T6837] ? __bad_area_nosemaphore+0x2b0/0x420 [ 180.373754][ T6837] ? down_read_trylock+0x106/0x160 [ 180.378836][ T6837] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 180.384438][ T6837] ? bad_area+0x6a/0x80 [ 180.388574][ T6837] exit_to_user_mode_loop+0xa2/0xe0 [ 180.393744][ T6837] exit_to_user_mode_prepare+0x76/0xa0 [ 180.399610][ T6837] irqentry_exit_to_user_mode+0x9/0x10 [ 180.405041][ T6837] irqentry_exit+0x12/0x60 [ 180.409430][ T6837] exc_page_fault+0x67/0xc0 [ 180.413906][ T6837] ? asm_exc_page_fault+0x8/0x30 [ 180.418836][ T6837] asm_exc_page_fault+0x1e/0x30 [ 180.423659][ T6837] RIP: 0033:0x7f37c67fc7a1 [ 180.428048][ T6837] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 180.447626][ T6837] RSP: 002b:00000000fffffeb0 EFLAGS: 00010217 [ 180.453669][ T6837] RAX: 0000000000000000 RBX: 00007f37c6a75fa0 RCX: 00007f37c67fc799 [ 180.461615][ T6837] RDX: 0000000000000000 RSI: 00000000fffffeb0 RDI: 0000000002000400 [ 180.469560][ T6837] RBP: 00007f37c6892c99 R08: 0000000000000000 R09: 0000000000000000 [ 180.477504][ T6837] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 180.485448][ T6837] R13: 00007f37c6a76038 R14: 00007f37c6a75fa0 R15: 00007ffe18a64048 [ 180.591621][ T6837] memory: usage 270120kB, limit 307200kB, failcnt 21746 [ 180.598676][ T6837] memory+swap: usage 379028kB, limit 9007199254740988kB, failcnt 0 [ 180.606644][ T6837] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 180.642987][ T6837] Memory cgroup stats for /syz3: [ 180.643101][ T6837] anon 270336 [ 180.643101][ T6837] file 268308480 [ 180.643101][ T6837] kernel_stack 0 [ 180.643101][ T6837] percpu 0 [ 180.643101][ T6837] sock 0 [ 180.643101][ T6837] shmem 268308480 [ 180.643101][ T6837] file_mapped 135168 [ 180.643101][ T6837] file_dirty 0 [ 180.643101][ T6837] file_writeback 0 [ 180.643101][ T6837] anon_thp 0 [ 180.643101][ T6837] inactive_anon 268689408 [ 180.643101][ T6837] active_anon 2027520 [ 180.643101][ T6837] inactive_file 0 [ 180.643101][ T6837] active_file 28672 [ 180.643101][ T6837] unevictable 0 [ 180.643101][ T6837] slab_reclaimable 0 [ 180.643101][ T6837] slab_unreclaimable 0 [ 180.643101][ T6837] slab 0 [ 180.643101][ T6837] workingset_refault_anon 66 [ 180.643101][ T6837] workingset_refault_file 5544 [ 180.643101][ T6837] workingset_activate_anon 0 [ 180.643101][ T6837] workingset_activate_file 3762 [ 180.643101][ T6837] workingset_restore_anon 0 [ 180.643101][ T6837] workingset_restore_file 3036 [ 180.742699][ T6837] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.1843,pid=6832,uid=0 [ 180.759233][ T6837] Memory cgroup out of memory: Killed process 6832 (syz.3.1843) total-vm:90312kB, anon-rss:1288kB, file-rss:55232kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 182.443472][ T7408] device syzkaller0 entered promiscuous mode [ 183.013671][ T7417] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.071645][ T7417] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.095912][ T7417] device bridge_slave_0 entered promiscuous mode [ 183.142244][ T7417] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.164547][ T7417] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.185314][ T7417] device bridge_slave_1 entered promiscuous mode [ 183.347353][ T24] audit: type=1400 audit(1773268403.399:167): avc: denied { create } for pid=7417 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 183.457988][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.481176][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.494380][ T24] audit: type=1400 audit(1773268403.399:168): avc: denied { write } for pid=7417 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 183.515040][ T24] audit: type=1400 audit(1773268403.399:169): avc: denied { read } for pid=7417 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 183.592997][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.619061][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.638101][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.645177][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.665059][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.673658][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.682215][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.689266][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.696964][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.867535][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.878919][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.887094][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.044722][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.057034][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.066794][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.076108][ T7417] device veth0_vlan entered promiscuous mode [ 184.125489][ T7417] device veth1_macvtap entered promiscuous mode [ 184.132970][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.148195][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.175313][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.397411][ T540] device veth1_macvtap left promiscuous mode [ 185.842440][ T7597] device syzkaller0 entered promiscuous mode [ 187.476839][ T7731] device syzkaller0 entered promiscuous mode [ 187.808181][ T7749] device syzkaller0 entered promiscuous mode [ 188.655572][ T7798] device veth1_macvtap left promiscuous mode [ 188.737767][ T7806] device veth1_macvtap entered promiscuous mode [ 189.008690][ T7823] device syzkaller0 entered promiscuous mode [ 189.290615][ T7864] device syzkaller0 entered promiscuous mode [ 189.597077][ T7893] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 189.885462][ T7893] device sit0 left promiscuous mode [ 191.228940][ T7968] 7B: renamed from syzkaller0 [ 191.490742][ T7995] dvmrp1: tun_chr_ioctl cmd 2147767520 [ 191.496248][ T7995] dvmrp1: tun_chr_ioctl cmd 2147767520 [ 191.594521][ T7997] syz.1.2165[7997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.594564][ T7997] syz.1.2165[7997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.612007][ T7996] dvmrp1: tun_chr_ioctl cmd 1074025673 [ 194.544628][ T8113] tap0: tun_chr_ioctl cmd 1074025680 [ 194.693941][ T8113] syzkaller0: mtu less than device minimum [ 194.860506][ T8131] device syzkaller0 entered promiscuous mode [ 195.174829][ T8158] device sit0 entered promiscuous mode [ 195.377451][ T8167] device veth1_macvtap left promiscuous mode [ 195.521796][ T8164] device veth1_macvtap entered promiscuous mode [ 195.536592][ T8164] device macsec0 entered promiscuous mode [ 204.184863][ T8362] syzkaller0: create flow: hash 1505046793 index 0 [ 204.185910][ T8364] device syzkaller0 entered promiscuous mode [ 204.612103][ T7951] syzkaller0: tun_net_xmit 76 [ 204.616906][ T7951] syzkaller0: tun_net_xmit 48 [ 204.641043][ C0] syzkaller0: tun_net_xmit 76 [ 204.721937][ T8372] syzkaller0 (unregistered): delete flow: hash 1505046793 index 0 [ 204.892812][ T8409] FAULT_INJECTION: forcing a failure. [ 204.892812][ T8409] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 204.999613][ T8409] CPU: 1 PID: 8409 Comm: syz.2.2278 Tainted: G W syzkaller #0 [ 205.008393][ T8409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 205.018458][ T8409] Call Trace: [ 205.021750][ T8409] __dump_stack+0x21/0x24 [ 205.026073][ T8409] dump_stack_lvl+0x1a7/0x208 [ 205.030740][ T8409] ? show_regs_print_info+0x18/0x18 [ 205.035912][ T8409] ? stack_trace_save+0xa6/0xf0 [ 205.040740][ T8409] ? path_openat+0x2970/0x31c0 [ 205.045477][ T8409] dump_stack+0x15/0x1c [ 205.049607][ T8409] should_fail+0x3c1/0x510 [ 205.053996][ T8409] should_fail_usercopy+0x1a/0x20 [ 205.058993][ T8409] _copy_from_user+0x20/0xd0 [ 205.063557][ T8409] ____sys_sendmsg+0x30a/0x8f0 [ 205.068292][ T8409] ? __sys_sendmsg_sock+0x40/0x40 [ 205.073294][ T8409] ? import_iovec+0x7c/0xb0 [ 205.077776][ T8409] ___sys_sendmsg+0x236/0x2e0 [ 205.082427][ T8409] ? __sys_sendmsg+0x280/0x280 [ 205.087162][ T8409] ? rw_verify_area+0x1c0/0x360 [ 205.091994][ T8409] ? __fdget+0x1a1/0x230 [ 205.096208][ T8409] __x64_sys_sendmsg+0x1f9/0x2c0 [ 205.101119][ T8409] ? fput+0x1a/0x20 [ 205.104912][ T8409] ? ___sys_sendmsg+0x2e0/0x2e0 [ 205.109738][ T8409] ? debug_smp_processor_id+0x17/0x20 [ 205.115085][ T8409] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 205.121139][ T8409] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 205.126745][ T8409] do_syscall_64+0x31/0x40 [ 205.131159][ T8409] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 205.137025][ T8409] RIP: 0033:0x7fb730454799 [ 205.141428][ T8409] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 205.161009][ T8409] RSP: 002b:00007fb72eeaf028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 205.169396][ T8409] RAX: ffffffffffffffda RBX: 00007fb7306cdfa0 RCX: 00007fb730454799 [ 205.177340][ T8409] RDX: 0000000000000080 RSI: 0000200000000e40 RDI: 0000000000000003 [ 205.185373][ T8409] RBP: 00007fb72eeaf090 R08: 0000000000000000 R09: 0000000000000000 [ 205.193320][ T8409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 205.201266][ T8409] R13: 00007fb7306ce038 R14: 00007fb7306cdfa0 R15: 00007ffe2534e288 [ 205.425838][ T8433] device syzkaller0 entered promiscuous mode [ 205.895710][ T8464] device xfrm0 entered promiscuous mode [ 206.839619][ T8506] device veth1_macvtap left promiscuous mode [ 206.859572][ T8506] device macsec0 left promiscuous mode [ 206.936968][ T8524] device veth1_macvtap entered promiscuous mode [ 207.002198][ T8524] device macsec0 entered promiscuous mode [ 207.103462][ T8533] : renamed from team_slave_1 [ 207.598208][ T8579] device syzkaller0 entered promiscuous mode [ 207.625826][ T8588] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 207.640578][ T8588] pim6reg0: linktype set to 768 [ 207.705021][ T8590] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 207.719602][ T8590] pim6reg0: linktype set to 768 [ 208.879753][ T8651] bridge0: port 3(veth0_to_bridge) entered blocking state [ 208.926916][ T8651] bridge0: port 3(veth0_to_bridge) entered disabled state [ 209.022054][ T8651] device veth0_to_bridge entered promiscuous mode [ 209.135113][ T8651] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 209.313998][ T8651] bridge0: port 3(veth0_to_bridge) entered blocking state [ 209.321170][ T8651] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 209.350931][ T8662] tap0: tun_chr_ioctl cmd 1074025675 [ 209.356241][ T8662] tap0: persist enabled [ 210.320738][ T8678] syz.2.2354[8678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.320792][ T8678] syz.2.2354[8678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.439829][ T8675] -: renamed from syzkaller0 [ 211.249996][ T8693] device veth1_macvtap left promiscuous mode [ 213.094554][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.107323][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.122550][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.136922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.152710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.166640][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.182827][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.196357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.211599][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.225518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.099535][ C0] net_ratelimit: 40764 callbacks suppressed [ 218.099552][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 218.117590][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.129828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.141837][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 218.153886][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 218.155544][ T8827] : port 1(ip6gretap0) entered blocking state [ 218.166057][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.184294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.196337][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 218.208367][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 218.220476][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.280882][ T8827] : port 1(ip6gretap0) entered disabled state [ 218.367443][ T8827] device ip6gretap0 entered promiscuous mode [ 218.716215][ T8828] device ip6gretap0 left promiscuous mode [ 218.752070][ T8828] : port 1(ip6gretap0) entered disabled state [ 221.011597][ T8895] device syzkaller0 entered promiscuous mode [ 222.471185][ T8965] device syzkaller0 entered promiscuous mode [ 223.109623][ C0] net_ratelimit: 49276 callbacks suppressed [ 223.109637][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.127618][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 223.139657][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 223.151755][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.163966][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.176005][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 223.188052][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 223.200166][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.212418][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.224435][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 224.144185][ T9061] tun0: tun_chr_ioctl cmd 1074025677 [ 224.156665][ T9061] tun0: linktype set to 820 [ 228.119655][ C0] net_ratelimit: 43493 callbacks suppressed [ 228.119681][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.141410][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.155241][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 228.168467][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 228.180994][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.194113][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.206525][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 228.219599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 228.231698][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.243905][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.025131][ T9264] device syzkaller0 entered promiscuous mode [ 233.129621][ C0] net_ratelimit: 37971 callbacks suppressed [ 233.129635][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.147570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 233.159707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 233.171798][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.184117][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.196111][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 233.208143][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 233.220239][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.232431][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.244441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 236.513991][ T9376] batadv0: tun_chr_ioctl cmd 2148553947 [ 237.052614][ T9385] device syzkaller0 entered promiscuous mode [ 237.168903][ T9406] nr0: port 1(macsec0) entered blocking state [ 237.175020][ T9406] nr0: port 1(macsec0) entered forwarding state [ 237.238933][ T9406] device nr0 entered promiscuous mode [ 238.139534][ C0] net_ratelimit: 47874 callbacks suppressed [ 238.139547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.157560][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 238.169704][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 238.181819][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.194350][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.206434][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 238.218463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 238.230563][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.242769][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.254753][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 238.334106][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 239.851091][ T9472] device syzkaller0 entered promiscuous mode [ 241.153291][ T9489] device sit0 left promiscuous mode [ 241.369424][ T9498] device wg2 left promiscuous mode [ 241.396108][ T9499] device wg2 entered promiscuous mode [ 243.149588][ C0] net_ratelimit: 53142 callbacks suppressed [ 243.149601][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.167547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 243.179608][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 243.191731][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.203964][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.215996][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 243.228052][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:0d:00:29:07:ce, vlan:0) [ 243.240181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.252440][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.264454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.029295][ T9601] bridge0: port 3(veth0_to_bridge) entered disabled state [ 247.036539][ T9601] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.043701][ T9601] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.199336][ T9604] device veth0_to_bridge left promiscuous mode [ 247.210355][ T9604] bridge0: port 3(veth0_to_bridge) entered disabled state [ 247.249841][ T9604] device bridge_slave_1 left promiscuous mode [ 247.282602][ T9604] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.307385][ T9604] device bridge_slave_0 left promiscuous mode [ 247.362986][ T9604] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.537842][ T9623] device syzkaller0 entered promiscuous mode [ 247.914826][ T9642] device syzkaller0 entered promiscuous mode [ 248.123945][ T9644] device syzkaller0 left promiscuous mode [ 249.012017][ T9700] device syzkaller0 entered promiscuous mode [ 251.077563][ T9792] device syzkaller0 entered promiscuous mode [ 252.633737][ T9883] device syzkaller0 entered promiscuous mode [ 252.813635][ T9889] syzkaller0: refused to change device tx_queue_len [ 254.226173][ T9925] device syzkaller0 entered promiscuous mode [ 254.300199][ T9938] device syzkaller0 entered promiscuous mode [ 254.381236][ T9947] device syzkaller0 entered promiscuous mode [ 254.415791][ T9950] device wg2 left promiscuous mode [ 254.461656][ T9957] device wg2 entered promiscuous mode [ 255.931195][T10060] tap0: tun_chr_ioctl cmd 1074025675 [ 255.936496][T10060] tap0: persist enabled [ 255.949573][T10059] tap0: tun_chr_ioctl cmd 1074025673 [ 255.962328][T10059] tap0: tun_chr_ioctl cmd 1074025673 [ 255.967760][T10060] tap0: tun_chr_ioctl cmd 1074025675 [ 255.973504][T10060] tap0: persist enabled [ 255.977752][T10059] tap0: tun_chr_ioctl cmd 1074025673 [ 255.984129][T10058] tap0: tun_chr_ioctl cmd 1074025675 [ 255.989432][T10058] tap0: persist enabled [ 256.108105][T10067] : port 1(vlan1) entered blocking state [ 256.119337][T10067] : port 1(vlan1) entered disabled state [ 256.125999][T10067] device vlan1 entered promiscuous mode [ 256.687150][ T24] audit: type=1400 audit(1773268476.739:170): avc: denied { create } for pid=10129 comm="syz.4.2751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 256.800678][T10141] syz.4.2752[10141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.800733][T10141] syz.4.2752[10141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.848704][T10140] device syzkaller0 entered promiscuous mode [ 256.950726][T10116] bridge0: port 3(veth0_vlan) entered disabled state [ 257.160638][T10174] device syzkaller0 entered promiscuous mode [ 257.356132][T10182] device syzkaller0 entered promiscuous mode [ 258.822531][T10305] : renamed from bond_slave_0 [ 262.646786][ T24] audit: type=1400 audit(1773268482.699:171): avc: denied { create } for pid=10460 comm="syz.4.2857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 262.966648][T10479] device syzkaller0 entered promiscuous mode [ 263.140674][T10485] device syzkaller0 entered promiscuous mode [ 263.670165][T10497] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.677215][T10497] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.684835][T10497] device bridge_slave_0 entered promiscuous mode [ 263.691829][T10497] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.698863][T10497] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.706506][T10497] device bridge_slave_1 entered promiscuous mode [ 264.269243][T10497] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.276312][T10497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.283582][T10497] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.290610][T10497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.602893][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.616600][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.713589][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.850107][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.879375][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.886449][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.893837][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.903430][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.910483][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.918345][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.926635][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.943368][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 264.951805][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.038134][T10497] device veth0_vlan entered promiscuous mode [ 265.075438][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 265.084369][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.144289][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.151992][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.167264][T10497] device veth1_macvtap entered promiscuous mode [ 265.186083][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.194470][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.202711][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.233533][T10549] batadv0: tun_chr_ioctl cmd 1074025677 [ 265.239151][T10549] batadv0: linktype set to 776 [ 265.259622][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.268211][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.283338][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.294757][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.307189][ T24] audit: type=1400 audit(1773268485.369:172): avc: denied { unmount } for pid=10497 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 265.874212][ T7] device vlan1 left promiscuous mode [ 265.880214][ T7] : port 1(vlan1) entered disabled state [ 265.953977][ T7] device bridge_slave_1 left promiscuous mode [ 266.019709][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.029620][ T7] device bridge_slave_0 left promiscuous mode [ 266.035952][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.191818][T10724] : port 1(syz_tun) entered blocking state [ 269.205310][T10724] : port 1(syz_tun) entered disabled state [ 269.235805][T10724] device syz_tun entered promiscuous mode [ 270.699918][T10819] device bond_slave_0 entered promiscuous mode [ 270.706480][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 270.729297][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.775903][T10822] device syzkaller0 entered promiscuous mode [ 272.292727][T10881] device syzkaller0 entered promiscuous mode [ 272.431032][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.439881][ T9] bridge0: port 3(veth0_vlan) entered blocking state [ 272.446603][ T9] bridge0: port 3(veth0_vlan) entered forwarding state [ 272.458532][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.466362][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.581949][T10922] device syzkaller0 entered promiscuous mode [ 273.592306][T10972] : renamed from bond_slave_0 [ 275.542097][T11093] tun0: tun_chr_ioctl cmd 1074025677 [ 275.554365][T11093] tun0: linktype set to 825 [ 275.568693][T11094] tun0: tun_chr_ioctl cmd 2147767521 [ 276.556337][ T24] audit: type=1400 audit(1773268496.609:173): avc: denied { mounton } for pid=11150 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 277.137962][T11150] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.145790][T11150] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.153548][T11150] device bridge_slave_0 entered promiscuous mode [ 277.161611][T11150] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.168665][T11150] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.176267][T11150] device bridge_slave_1 entered promiscuous mode [ 277.218356][T11150] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.225409][T11150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.232677][T11150] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.239736][T11150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.256968][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.265744][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.273331][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.307684][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.316068][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.323108][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.332260][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.341027][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.348090][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.360732][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.380209][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.401409][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 277.413014][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.421522][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.428972][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.437821][T11150] device veth0_vlan entered promiscuous mode [ 277.457528][T11150] device veth1_macvtap entered promiscuous mode [ 277.483923][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.526143][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.625502][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 278.165674][ T540] bridge0: port 4(gretap0) entered disabled state [ 278.219990][ T540] device gretap0 left promiscuous mode [ 278.271274][ T540] bridge0: port 4(gretap0) entered disabled state [ 278.711766][ T540] nr0: port 1(macsec0) entered disabled state [ 278.729043][ T540] bridge0: port 3(veth0_vlan) entered disabled state [ 278.784074][ T540] device bridge_slave_1 left promiscuous mode [ 278.810462][ T540] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.883403][ T540] device bridge_slave_0 left promiscuous mode [ 278.930184][ T540] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.961424][ T540] device veth1_macvtap left promiscuous mode [ 279.452541][T11255] device syzkaller0 entered promiscuous mode [ 280.045333][T11281] device syzkaller0 entered promiscuous mode [ 280.092110][T11278] batadv0: tun_chr_ioctl cmd 1074025684 [ 280.327567][T11323] device syzkaller0 entered promiscuous mode [ 280.343665][T11323] net_ratelimit: 30210 callbacks suppressed [ 280.343672][T11323] syzkaller0: mtu less than device minimum [ 280.455550][T11328] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.462933][T11328] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.470506][T11328] device bridge_slave_0 entered promiscuous mode [ 280.480461][T11328] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.549645][T11328] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.633524][T11328] device bridge_slave_1 entered promiscuous mode [ 280.859049][T11328] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.866143][T11328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.928967][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.940030][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.954897][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.988743][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.004129][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.027396][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.034583][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.099677][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.124327][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.131479][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.161363][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.169771][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.184506][T11366] tap0: tun_chr_ioctl cmd 1074025677 [ 281.190180][T11366] tap0: linktype set to 805 [ 281.197827][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.211453][T11368] device pim6reg1 entered promiscuous mode [ 281.221807][T11328] device veth0_vlan entered promiscuous mode [ 281.230636][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.239023][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.246832][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.274028][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.283238][T11328] device veth1_macvtap entered promiscuous mode [ 281.307586][T11377] device syzkaller0 entered promiscuous mode [ 281.316085][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.326131][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.434502][T11385] batadv0: tun_chr_ioctl cmd 2148553947 [ 281.667081][T11416] device veth0_vlan left promiscuous mode [ 281.693954][T11416] device veth0_vlan entered promiscuous mode [ 281.825203][ T540] device ip6gretap0 left promiscuous mode [ 281.852668][ T540] : port 1(ip6gretap0) entered disabled state [ 282.862804][T11442] device wg2 entered promiscuous mode [ 283.099300][T11476] device veth0_vlan left promiscuous mode [ 283.119780][T11476] device veth0_vlan entered promiscuous mode [ 283.160901][ T540] device gretap0 left promiscuous mode [ 283.170197][ T540] bridge0: port 3(gretap0) entered disabled state [ 283.862763][ T540] device vlan1 left promiscuous mode [ 283.868164][ T540] : port 1(vlan1) entered disabled state [ 283.889398][ T540] device bridge_slave_1 left promiscuous mode [ 283.901275][ T540] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.909078][ T540] device bridge_slave_0 left promiscuous mode [ 283.915582][ T540] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.924420][ T540] device veth1_macvtap left promiscuous mode [ 284.128960][T11494] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.136385][T11494] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.143913][T11494] device bridge_slave_0 entered promiscuous mode [ 284.151162][T11494] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.158201][T11494] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.165643][T11494] device bridge_slave_1 entered promiscuous mode [ 284.302351][T11514] device veth0_vlan left promiscuous mode [ 284.318567][T11514] device veth0_vlan entered promiscuous mode [ 284.610915][T11494] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.617987][T11494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.625269][T11494] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.632292][T11494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.677380][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.685159][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.695103][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.704410][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.712802][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.721027][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.741743][T11494] device veth0_vlan entered promiscuous mode [ 284.768454][T11494] device veth1_macvtap entered promiscuous mode [ 284.817663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.875983][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.891917][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.907818][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.923825][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.939319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.955112][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.971039][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.986969][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.029772][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.057619][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.602424][T11572] tun0: tun_chr_ioctl cmd 2147767506 [ 285.818642][T11585] device sit0 entered promiscuous mode [ 287.342976][ T540] device macsec0 left promiscuous mode [ 287.359361][ T540] nr0: port 1(macsec0) entered disabled state [ 287.437023][ T540] device veth0_vlan left promiscuous mode [ 287.760884][T11686] device syzkaller0 entered promiscuous mode [ 290.284834][T11777] : renamed from team_slave_1 [ 290.590683][T11772] device veth0_vlan left promiscuous mode [ 290.651480][T11772] device veth0_vlan entered promiscuous mode [ 291.206074][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.220103][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.300427][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.351047][T11807] device syzkaller0 entered promiscuous mode [ 291.693544][T11833] device syzkaller0 entered promiscuous mode [ 294.210385][T11922] device syzkaller0 entered promiscuous mode [ 294.286004][T11925] tap0: tun_chr_ioctl cmd 2147767520 [ 295.289156][T12011] device syzkaller0 entered promiscuous mode [ 297.093771][T12142] device syzkaller0 entered promiscuous mode [ 297.597550][T12152] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 297.609166][T12152] device syzkaller0 entered promiscuous mode [ 299.178877][T12213] device pim6reg1 entered promiscuous mode [ 299.445136][T12221] device syzkaller0 entered promiscuous mode [ 299.557607][T12228] device veth1_macvtap left promiscuous mode [ 299.865521][T12242] sock: sock_set_timeout: `syz.0.3354' (pid 12242) tries to set negative timeout [ 300.750606][T12310] @: renamed from bond_slave_0 [ 301.002560][T12327] device veth1_macvtap left promiscuous mode [ 301.507162][T12377] device syzkaller0 entered promiscuous mode [ 302.281380][T12411] device syzkaller0 entered promiscuous mode [ 302.573425][T12421] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 302.620266][T12421] syzkaller0: linktype set to 825 [ 302.717969][T12421] device syzkaller0 entered promiscuous mode [ 302.787449][ T20] syzkaller0: tun_net_xmit 64 [ 303.738524][T12466] device syzkaller0 entered promiscuous mode [ 306.047592][T12577] device wg2 entered promiscuous mode [ 306.296362][T12582] device syzkaller0 entered promiscuous mode [ 307.721114][T12642] device syzkaller0 entered promiscuous mode [ 308.735846][T12698] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 309.235006][T12705] device syzkaller0 entered promiscuous mode [ 309.667185][T12743] device syzkaller0 entered promiscuous mode [ 310.353640][T12765] device wg2 entered promiscuous mode [ 310.477654][T12773] device syzkaller0 entered promiscuous mode [ 310.522464][T12776] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 310.607741][T12778] sit0: mtu greater than device maximum [ 312.842458][T12866] syz.2.3533[12866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.842592][T12866] syz.2.3533[12866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.218930][T12877] device xfrm0 entered promiscuous mode [ 318.557524][T12977] macsec0: mtu greater than device maximum [ 319.711196][T12998] device syzkaller0 entered promiscuous mode [ 320.146885][T13004] device syzkaller0 entered promiscuous mode [ 320.505720][T13018] 7B: renamed from syzkaller0 [ 320.530846][T13013] device veth0_vlan left promiscuous mode [ 320.572141][T13029] cgroup: fork rejected by pids controller in /syz1 [ 320.583762][T13013] device veth0_vlan entered promiscuous mode [ 320.606792][T13024] device veth1_macvtap left promiscuous mode [ 320.614675][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.623094][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.632531][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.723061][ T48] device bridge_slave_1 left promiscuous mode [ 321.730326][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.765020][ T48] device bridge_slave_0 left promiscuous mode [ 321.786282][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.840498][ T48] device veth0_vlan left promiscuous mode [ 322.431354][T13160] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.544548][T13160] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.627695][T13160] device bridge_slave_0 entered promiscuous mode [ 322.710329][T13160] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.759547][T13160] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.767001][T13160] device bridge_slave_1 entered promiscuous mode [ 322.815532][T13204] device syzkaller0 entered promiscuous mode [ 322.987656][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.995610][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.089215][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.107948][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.122624][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.129704][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.152084][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.169427][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.185697][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.203852][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.210921][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.731292][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.779023][T13160] device veth0_vlan entered promiscuous mode [ 323.801276][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.814026][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.847232][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.859712][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.867319][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.980819][T13160] device veth1_macvtap entered promiscuous mode [ 323.988227][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 323.998452][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.006810][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 324.024358][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.032726][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 324.042506][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.050939][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.104873][T13232] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 324.232703][T13246] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 324.378394][T13253] device syzkaller0 entered promiscuous mode [ 327.657528][T13343] device syzkaller0 entered promiscuous mode [ 329.420359][T13379] device wg2 left promiscuous mode [ 331.460761][T13423] device lo entered promiscuous mode [ 332.335737][T13466] device syzkaller0 entered promiscuous mode [ 332.490609][T13478] device wg2 left promiscuous mode [ 332.574959][T13477] device wg2 entered promiscuous mode [ 333.791928][T13525] device syzkaller0 entered promiscuous mode [ 334.974912][T13579] device syzkaller0 entered promiscuous mode [ 335.993701][T13608] device syzkaller0 entered promiscuous mode [ 337.437491][T13654] device syzkaller0 entered promiscuous mode [ 338.960663][T13716] device syzkaller0 entered promiscuous mode [ 341.268060][T13807] device syzkaller0 entered promiscuous mode [ 341.310979][T13806] device veth0_vlan left promiscuous mode [ 341.318085][T13806] device veth0_vlan entered promiscuous mode [ 342.334220][T13856] device veth0_vlan left promiscuous mode [ 342.368786][T13856] device veth0_vlan entered promiscuous mode [ 343.200347][T13942] device syzkaller0 entered promiscuous mode [ 343.403809][T13952] device syzkaller0 entered promiscuous mode [ 343.418909][T13952] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 343.468508][T13963] cgroup: fork rejected by pids controller in /syz3 [ 344.248404][T13997] device syzkaller0 entered promiscuous mode [ 345.006592][T14003] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.027899][T14003] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.039856][T14003] device bridge_slave_0 entered promiscuous mode [ 345.165398][T14003] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.172464][T14003] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.179947][T14003] device bridge_slave_1 entered promiscuous mode [ 345.437871][T14003] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.444957][T14003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.452240][T14003] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.459252][T14003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.491843][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.511843][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.524758][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.545270][T14049] device lo left promiscuous mode [ 345.554646][T14049] Q6`Ҙ: renamed from lo [ 345.565604][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.574173][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.581256][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.598450][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.607247][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.614355][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.651937][T14058] device syzkaller0 entered promiscuous mode [ 345.658855][T14056] -1: renamed from syzkaller0 [ 345.693606][T14058] device syzkaller0 left promiscuous mode [ 345.722880][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.797653][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.910005][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 346.018454][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.072396][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 346.083328][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 346.094134][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 346.102339][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.117214][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.131382][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.147253][T14003] device veth0_vlan entered promiscuous mode [ 346.291062][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 346.323497][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 346.403490][T14003] device veth1_macvtap entered promiscuous mode [ 346.427815][ T7] device bridge_slave_1 left promiscuous mode [ 346.446714][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.464793][ T7] device bridge_slave_0 left promiscuous mode [ 346.490966][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.507974][ T7] device veth1_macvtap left promiscuous mode [ 346.519619][ T7] device veth0_vlan left promiscuous mode [ 346.825086][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 346.835087][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 346.853570][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 346.869976][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 346.887058][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 347.025566][T14078] tun0: tun_chr_ioctl cmd 1074025677 [ 347.040127][T14078] tun0: linktype set to 820 [ 347.238837][T14081] device pim6reg1 entered promiscuous mode [ 347.659023][T14128] tap0: tun_chr_ioctl cmd 1074025675 [ 347.667783][T14128] tap0: persist enabled [ 347.676632][T14128] tap0: tun_chr_ioctl cmd 1074025675 [ 347.688527][T14128] tap0: persist disabled [ 348.675158][T14188] device syzkaller0 entered promiscuous mode [ 354.171432][T14356] syz.4.3912[14356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.171512][T14356] syz.4.3912[14356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.354284][T14360] device veth0_vlan left promiscuous mode [ 354.484443][T14360] device veth0_vlan entered promiscuous mode [ 357.394092][T14481] device syzkaller0 entered promiscuous mode [ 357.683305][T14487] device syzkaller0 entered promiscuous mode [ 357.936839][T14495] device syzkaller0 entered promiscuous mode [ 360.287363][T14623] device syzkaller0 entered promiscuous mode [ 360.325880][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 362.414071][ T24] audit: type=1400 audit(1773268582.469:174): avc: denied { create } for pid=14731 comm="syz.2.4023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 364.575253][T14840] device syzkaller0 entered promiscuous mode [ 365.827633][T14935] device syzkaller0 entered promiscuous mode [ 366.443764][T14951] device pim6reg1 entered promiscuous mode [ 368.172756][T15025] device syzkaller0 entered promiscuous mode [ 368.180646][T15022] ref_ctr_offset mismatch. inode: 0x3e3 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 368.203947][T15020] device pim6reg1 entered promiscuous mode [ 369.851430][T15105] device syzkaller0 entered promiscuous mode [ 370.609374][T15112] device syzkaller0 entered promiscuous mode [ 371.818095][T15144] device syzkaller0 entered promiscuous mode [ 373.598071][T15211] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 374.597170][T15230] device syzkaller0 entered promiscuous mode [ 374.924840][T15276] device syzkaller0 entered promiscuous mode [ 375.735212][T15293] device syzkaller0 entered promiscuous mode [ 377.684657][T15432] device syzkaller0 entered promiscuous mode [ 378.229031][T15447] device veth1_macvtap entered promiscuous mode [ 378.299263][T15447] device macsec0 entered promiscuous mode [ 378.386310][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 378.845589][T15522] device syzkaller0 entered promiscuous mode [ 380.362995][T15628] : port 1(ip6gretap0) entered blocking state [ 380.369254][T15628] : port 1(ip6gretap0) entered disabled state [ 380.376009][T15628] device ip6gretap0 entered promiscuous mode [ 380.392799][T15628] device ip6gretap0 left promiscuous mode [ 380.402734][T15628] : port 1(ip6gretap0) entered disabled state [ 383.336568][T15755] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 383.377286][T15755] device syzkaller0 entered promiscuous mode [ 383.943570][T15770] device syzkaller0 entered promiscuous mode [ 385.874807][T15863] device syzkaller0 entered promiscuous mode [ 386.086788][T15863] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 386.446543][T15875] device veth0_vlan left promiscuous mode [ 386.531346][T15875] device veth0_vlan entered promiscuous mode [ 386.901392][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 386.930187][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 386.974027][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.091906][T15946] device syzkaller0 entered promiscuous mode [ 388.715697][T15968] : renamed from team_slave_1 [ 388.839608][T15994] bridge0: port 3(veth0_to_bridge) entered blocking state [ 388.884136][T15994] bridge0: port 3(veth0_to_bridge) entered disabled state [ 388.893995][T15994] device veth0_to_bridge entered promiscuous mode [ 388.902459][T15994] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 388.914954][T15994] bridge0: port 3(veth0_to_bridge) entered blocking state [ 388.922082][T15994] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 389.031674][T16013] device veth0_vlan left promiscuous mode [ 389.037645][T16013] device veth0_vlan entered promiscuous mode [ 389.050856][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.065431][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.076313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 389.089856][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 389.102133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 389.114262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 389.126387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 389.138544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 389.150672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 389.162960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 389.175069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 389.187199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 389.199306][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 394.099811][ C1] net_ratelimit: 86717 callbacks suppressed [ 394.099841][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 394.118445][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 394.131097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 394.143754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 394.156607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 394.168762][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 394.180904][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 394.193015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 394.205105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 394.217205][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 395.594925][T16131] device syzkaller0 entered promiscuous mode [ 398.731752][T16201] : renamed from bond_slave_0 [ 399.109548][ C1] net_ratelimit: 117434 callbacks suppressed [ 399.109561][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 399.127718][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 399.139824][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 399.151965][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 399.164096][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 399.176189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 399.188299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 399.200365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 399.212464][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 399.224567][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 399.593886][T16211] device syzkaller0 entered promiscuous mode [ 400.896650][T16219] tun0: tun_chr_ioctl cmd 1074025676 [ 400.902077][T16219] tun0: owner set to 0 [ 404.119531][ C1] net_ratelimit: 115493 callbacks suppressed [ 404.119544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 404.137692][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 404.149826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 404.161951][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 404.174081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 404.186202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 404.198315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 404.210446][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 404.222548][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 404.234665][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 406.125971][T16340] device syzkaller0 entered promiscuous mode [ 406.460181][T16357] tap0: tun_chr_ioctl cmd 1074025675 [ 406.507790][T16357] tap0: persist disabled [ 406.556436][T16358] tap0: tun_chr_ioctl cmd 1074025675 [ 406.569915][T16358] tap0: persist disabled [ 409.129551][ C1] net_ratelimit: 100167 callbacks suppressed [ 409.129561][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 409.147670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 409.159787][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 409.171898][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 409.183993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 409.196077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 409.208188][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 409.220261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 409.232367][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 409.244515][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 413.370731][T16539] device syzkaller0 entered promiscuous mode [ 413.912636][T16567] device syzkaller0 entered promiscuous mode [ 414.143997][ C1] net_ratelimit: 86065 callbacks suppressed [ 414.144026][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 414.164810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 414.180339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 414.195930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 414.209523][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 414.223521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 414.237989][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 414.252167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 414.267539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 414.282112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 415.559908][ T24] audit: type=1400 audit(1773268635.619:175): avc: denied { create } for pid=16635 comm="syz.0.4555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 416.211677][T16663] tap0: tun_chr_ioctl cmd 1074025675 [ 416.216985][T16663] tap0: persist enabled [ 416.703290][T16662] tap0: tun_chr_ioctl cmd 1074025675 [ 416.708620][T16662] tap0: persist enabled [ 416.767822][T16663] tap0: tun_chr_ioctl cmd 1074025675 [ 416.814962][T16663] tap0: persist enabled [ 417.148868][T16686] device syzkaller0 entered promiscuous mode [ 419.066755][T16752] device veth1_macvtap entered promiscuous mode [ 419.093117][T16752] device macsec0 entered promiscuous mode [ 419.149530][ C1] net_ratelimit: 95574 callbacks suppressed [ 419.149543][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 419.167608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 419.179741][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 419.191865][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 419.203986][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 419.216108][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 419.228289][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 419.240443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 419.252564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 419.264683][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 423.472850][ T24] audit: type=1400 audit(1773268643.529:176): avc: denied { create } for pid=16961 comm="syz.0.4639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 423.749974][T16976] device syzkaller0 entered promiscuous mode [ 424.159542][ C1] net_ratelimit: 120836 callbacks suppressed [ 424.159554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 424.177670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 424.189783][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 424.201878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 424.214348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 424.226565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 424.238688][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 424.250785][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 424.262903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 424.274989][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:fe:ce:b6:9e:cb, vlan:0) [ 425.769238][T17005] device syzkaller0 entered promiscuous mode [ 427.304644][T12307] ------------[ cut here ]------------ [ 427.313722][T12307] kernel BUG at kernel/bpf/arraymap.c:993! [ 427.346866][T12307] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 427.352958][T12307] CPU: 0 PID: 12307 Comm: kworker/0:65 Tainted: G W syzkaller #0 [ 427.361962][T12307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 427.372025][T12307] Workqueue: events prog_array_map_clear_deferred [ 427.378434][T12307] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 427.384745][T12307] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 427.404342][T12307] RSP: 0018:ffffc9000352fc18 EFLAGS: 00010293 [ 427.410397][T12307] RAX: ffffffff817b4f8b RBX: ffff888105fd72d0 RCX: ffff88813cbbbb40 [ 427.418352][T12307] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 427.426314][T12307] RBP: ffffc9000352fc98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 427.434284][T12307] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 427.442243][T12307] R13: ffff8881259ea680 R14: 0000000000000001 R15: ffff8881259ea600 [ 427.450203][T12307] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 427.459114][T12307] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 427.465683][T12307] CR2: 00007ffeed265ff8 CR3: 000000010dd35000 CR4: 00000000003506b0 [ 427.473648][T12307] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 8000000000000000 [ 427.481608][T12307] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 427.489557][T12307] Call Trace: [ 427.492840][T12307] ? bpf_prog_7ebecce8859903e4+0xb/0x8c4 [ 427.498461][T12307] fd_array_map_delete_elem+0x14c/0x250 [ 427.503998][T12307] prog_array_map_clear_deferred+0x9e/0x140 [ 427.509874][T12307] process_one_work+0x6e1/0xba0 [ 427.514709][T12307] worker_thread+0xa6a/0x13c0 [ 427.519378][T12307] kthread+0x346/0x3d0 [ 427.523430][T12307] ? worker_clr_flags+0x190/0x190 [ 427.528436][T12307] ? kthread_blkcg+0xd0/0xd0 [ 427.533022][T12307] ret_from_fork+0x1f/0x30 [ 427.537415][T12307] Modules linked in: [ 427.599204][T12307] ---[ end trace 59fcab5ac9ec6fdd ]--- [ 427.604767][T12307] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 427.611918][T12307] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 427.631758][T12307] RSP: 0018:ffffc9000352fc18 EFLAGS: 00010293 [ 427.637879][T12307] RAX: ffffffff817b4f8b RBX: ffff888105fd72d0 RCX: ffff88813cbbbb40 [ 427.646476][T12307] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 427.654634][T12307] RBP: ffffc9000352fc98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 427.664332][T12307] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 427.672472][T12307] R13: ffff8881259ea680 R14: 0000000000000001 R15: ffff8881259ea600 [ 427.680599][T12307] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 427.689679][T12307] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 427.696297][T12307] CR2: 00007fb0a74b0fa0 CR3: 000000010d4a1000 CR4: 00000000003506b0 [ 427.704465][T12307] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 8000000000000000 [ 427.712580][T12307] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 427.720719][T12307] Kernel panic - not syncing: Fatal exception [ 427.727065][T12307] Kernel Offset: disabled [ 427.731370][T12307] Rebooting in 86400 seconds..