last executing test programs: 30.034306754s ago: executing program 3 (id=1287): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x8, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x50}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext, 0x2401, 0x8, 0x4, 0x3, 0x1ff, 0x88, 0x4, 0x0, 0x6d87, 0x0, 0x8789}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000800), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/11], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x80, 0xc1, 0x3, 0x7, 0x5, 0x0, 0x7, 0x280, 0x3ee741075b6352a9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0x7}, 0x100004, 0xfff, 0xd, 0x4, 0x2, 0xc2ce, 0x3, 0x0, 0x2, 0x0, 0x5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1dbe8ec5) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, 0x0, 0x0, 0x5626, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) 29.935313397s ago: executing program 3 (id=1289): r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000ff7f0000000005000609000000000000610000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x14, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8941, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x30}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) 29.545928459s ago: executing program 2 (id=1294): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x10041, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$LINK_DETACH(0x22, &(0x7f0000000340), 0x4) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 29.484556591s ago: executing program 2 (id=1295): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 29.409715514s ago: executing program 0 (id=1296): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 29.370997565s ago: executing program 2 (id=1297): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000fcffffff000000ca00000000ffffffffffffff7f1801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000800001e3674123a572b81d7d7948305320000009500"/109], 0x0, 0x2, 0x0, 0x0, 0x0, 0x34}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000340)=ANY=[@ANYRESOCT=r0, @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000204, 0xa021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='cpu&\t\t') openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000007996b9ac61108e000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002400000024000000020000000000000000000004000000030000000000000006010000"], 0xffffffffffffffff, 0x3e, 0x0, 0x2}, 0x28) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000040), 0x1) close(r2) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) socketpair(0xf, 0x6, 0x7c42, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xa2a}, 0x0, 0x0, 0xf, 0x3, 0x0, 0x0, 0x40, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x140, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r5, 0x40047459, 0xf0ff1f00000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0x3) 29.322752466s ago: executing program 0 (id=1298): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000080000000850000002b000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000000000000000000000000000001802"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="c1dfb061cd21d3084d94d35486dd", 0x0, 0x12700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 29.274812038s ago: executing program 0 (id=1300): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x8, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x50}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext, 0x2401, 0x8, 0x4, 0x3, 0x1ff, 0x88, 0x4, 0x0, 0x6d87, 0x0, 0x8789}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000800), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/11], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x80, 0xc1, 0x3, 0x7, 0x5, 0x0, 0x7, 0x280, 0x3ee741075b6352a9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0x7}, 0x100004, 0xfff, 0xd, 0x4, 0x2, 0xc2ce, 0x3, 0x0, 0x2, 0x0, 0x5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1dbe8ec5) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, 0x0, 0x0, 0x5626, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) 29.23799185s ago: executing program 1 (id=1301): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 29.189518891s ago: executing program 3 (id=1302): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x30, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe33, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6}, &(0x7f0000000280), &(0x7f0000000240)=r4}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000000c0)=r7, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x10, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x7, 0x1d, &(0x7f0000000040)=""/29, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x2, 0x3, 0x9f, 0x77}, 0x10, 0xffffffffffffffff, r7, 0xa, 0x0, &(0x7f0000000500)=[{0x4, 0x2, 0xf, 0xa}, {0x0, 0x5, 0xe}, {0x4, 0x3, 0x3, 0x5}, {0x5, 0x5, 0x0, 0x2}, {0x0, 0x2, 0xc, 0x6}, {0x4, 0x4, 0x4, 0x9}, {0x5, 0x3, 0xe, 0x1}, {0x0, 0x1, 0xb, 0xc}, {0x2, 0x1, 0x3, 0x3}, {0x3, 0x2, 0xe}], 0x10, 0x200}, 0x94) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000100000000000000000000008500000087000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e097566f5bec64466cf0925782dd", 0x0, 0x8c9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=r8, 0x4) 29.188864211s ago: executing program 1 (id=1303): bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) ioctl$SIOCSIFHWADDR(r0, 0x8914, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 29.178077141s ago: executing program 0 (id=1304): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) 29.139249613s ago: executing program 1 (id=1305): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x4, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) 29.138992242s ago: executing program 2 (id=1306): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x10041, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$LINK_DETACH(0x22, &(0x7f0000000340), 0x4) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 29.138518403s ago: executing program 0 (id=1307): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0xfc, 0xff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6b106c6383c1919f}, 0x8b001, 0x0, 0xfffffffd, 0x5, 0xffffffffffffffff, 0x7fd, 0x3, 0x0, 0xffffbffe, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) close(0x3) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0xfe, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x7, 0x0, 0x0, 0x7665}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={@fallback=r7, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014006500b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2a}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') 29.088555664s ago: executing program 2 (id=1308): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 29.088339054s ago: executing program 1 (id=1309): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x16, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8ab8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70300000a000000850000006900000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 29.088141664s ago: executing program 2 (id=1310): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x2e, &(0x7f0000000000)=r2, 0x4) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x100) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r3, 0x58, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0x7}, 0xc) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000cc0), 0x4) 28.803521283s ago: executing program 0 (id=1311): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x8, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x50}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r1}, 0xc) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext, 0x2401, 0x8, 0x4, 0x3, 0x1ff, 0x88, 0x4, 0x0, 0x6d87, 0x0, 0x8789}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000800), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/11], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x80, 0xc1, 0x3, 0x7, 0x5, 0x0, 0x7, 0x280, 0x3ee741075b6352a9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0x7}, 0x100004, 0xfff, 0xd, 0x4, 0x2, 0xc2ce, 0x3, 0x0, 0x2, 0x0, 0x5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1dbe8ec5) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) 28.803402283s ago: executing program 1 (id=1312): ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x87, &(0x7f0000000480)=""/135}, 0x94) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@fallback, 0x5, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x0, 0x80, 0x0, 0xf8, 0x0, 0xff, 0x0, 0xc, 0x4000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x5e62, 0x3}, 0x0, 0x5, 0xfff, 0x9, 0xe400, 0x4, 0x72e5, 0x0, 0xffe, 0x0, 0x9}) 28.803338783s ago: executing program 3 (id=1313): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x17, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0xd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x17}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 28.778849804s ago: executing program 3 (id=1314): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x8, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x50}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r1}, 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x1, @perf_config_ext, 0x2401, 0x8, 0x4, 0x3, 0x1ff, 0x88, 0x4, 0x0, 0x6d87, 0x0, 0x8789}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000800), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/11], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x80, 0xc1, 0x3, 0x7, 0x5, 0x0, 0x7, 0x280, 0x3ee741075b6352a9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0x7}, 0x100004, 0xfff, 0xd, 0x4, 0x2, 0xc2ce, 0x3, 0x0, 0x2, 0x0, 0x5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1dbe8ec5) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, 0x0, 0x0, 0x5626, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) 28.732591455s ago: executing program 1 (id=1315): bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) ioctl$SIOCSIFHWADDR(r0, 0x8914, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 28.724986426s ago: executing program 3 (id=1325): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0xfc, 0xff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6b106c6383c1919f}, 0x8b001, 0x0, 0xfffffffd, 0x5, 0xffffffffffffffff, 0x7fd, 0x3, 0x0, 0xffffbffe, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) close(0x3) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0xfe, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x7, 0x0, 0x0, 0x7665}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={@fallback=r7, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014006500b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2a}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') 11.272790377s ago: executing program 4 (id=1196): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x5, &(0x7f0000000780), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000300)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 9.230875293s ago: executing program 4 (id=1196): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x5, &(0x7f0000000780), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000300)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 7.061289613s ago: executing program 4 (id=1196): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x5, &(0x7f0000000780), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000300)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 4.790032315s ago: executing program 4 (id=1196): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x5, &(0x7f0000000780), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000300)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2.431004511s ago: executing program 4 (id=1196): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x5, &(0x7f0000000780), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000300)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 4 (id=1196): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x5, &(0x7f0000000780), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000300)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): T1736] [ 62.738728][ T1736] __dump_stack+0x21/0x24 [ 62.743258][ T1736] dump_stack_lvl+0x110/0x170 [ 62.747938][ T1736] ? __cfi_dump_stack_lvl+0x8/0x8 [ 62.753070][ T1736] ? kasan_set_track+0x60/0x70 [ 62.757959][ T1736] ? kasan_save_alloc_info+0x25/0x30 [ 62.763341][ T1736] ? __kasan_kmalloc+0x95/0xb0 [ 62.768104][ T1736] ? __kmalloc_node_track_caller+0xb1/0x1e0 [ 62.774285][ T1736] ? alloc_skb_with_frags+0xa8/0x620 [ 62.779587][ T1736] ? sock_alloc_send_pskb+0x87f/0x9a0 [ 62.784955][ T1736] ? tun_get_user+0xa63/0x3470 [ 62.789899][ T1736] dump_stack+0x15/0x24 [ 62.794266][ T1736] should_fail_ex+0x3d4/0x520 [ 62.799120][ T1736] should_fail_alloc_page+0x61/0x90 [ 62.804751][ T1736] prepare_alloc_pages+0x148/0x600 [ 62.810119][ T1736] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 62.815502][ T1736] __alloc_pages+0x15b/0x610 [ 62.820290][ T1736] ? __cfi___alloc_pages+0x10/0x10 [ 62.825577][ T1736] ? __kasan_check_write+0x14/0x20 [ 62.831028][ T1736] ? __build_skb_around+0x24f/0x470 [ 62.836671][ T1736] ? __alloc_skb+0x2df/0x4b0 [ 62.841540][ T1736] alloc_skb_with_frags+0x20c/0x620 [ 62.846837][ T1736] sock_alloc_send_pskb+0x87f/0x9a0 [ 62.852314][ T1736] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 62.858390][ T1736] ? stack_trace_save+0xa6/0xf0 [ 62.863418][ T1736] ? iov_iter_advance+0x98/0x1b0 [ 62.868542][ T1736] tun_get_user+0xa63/0x3470 [ 62.873175][ T1736] ? _parse_integer+0x2a/0x40 [ 62.878222][ T1736] ? tun_do_read+0x1cf0/0x1cf0 [ 62.883084][ T1736] ? __kasan_check_write+0x14/0x20 [ 62.888375][ T1736] ? ref_tracker_alloc+0x31d/0x4a0 [ 62.893658][ T1736] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 62.899198][ T1736] ? avc_policy_seqno+0x1b/0x70 [ 62.904052][ T1736] ? selinux_file_permission+0x2a5/0x510 [ 62.909695][ T1736] tun_chr_write_iter+0x1fb/0x300 [ 62.914812][ T1736] vfs_write+0x603/0xce0 [ 62.919136][ T1736] ? __cfi_vfs_write+0x10/0x10 [ 62.923998][ T1736] ? __fget_files+0x2d5/0x330 [ 62.928952][ T1736] ? __fdget_pos+0x1f2/0x380 [ 62.933642][ T1736] ? ksys_write+0x71/0x250 [ 62.938075][ T1736] ksys_write+0x149/0x250 [ 62.942403][ T1736] ? __cfi_ksys_write+0x10/0x10 [ 62.947506][ T1736] ? debug_smp_processor_id+0x17/0x20 [ 62.953129][ T1736] __x64_sys_write+0x7b/0x90 [ 62.958072][ T1736] x64_sys_call+0x27b/0x9a0 [ 62.962854][ T1736] do_syscall_64+0x4c/0xa0 [ 62.967316][ T1736] ? clear_bhb_loop+0x30/0x80 [ 62.972154][ T1736] ? clear_bhb_loop+0x30/0x80 [ 62.976995][ T1736] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 62.983499][ T1736] RIP: 0033:0x7f0523d9c819 [ 62.988168][ T1736] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 63.008288][ T1736] RSP: 002b:00007f0524cec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 63.016805][ T1736] RAX: ffffffffffffffda RBX: 00007f0524015fa0 RCX: 00007f0523d9c819 [ 63.025004][ T1736] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 63.033513][ T1736] RBP: 00007f0524cec090 R08: 0000000000000000 R09: 0000000000000000 [ 63.041930][ T1736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.050353][ T1736] R13: 00007f0524016038 R14: 00007f0524015fa0 R15: 00007ffd9e066828 [ 63.058550][ T1736] [ 63.341067][ T1778] FAULT_INJECTION: forcing a failure. [ 63.341067][ T1778] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 63.366538][ T1778] CPU: 0 PID: 1778 Comm: syz.3.557 Not tainted syzkaller #0 [ 63.373858][ T1778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 63.384163][ T1778] Call Trace: [ 63.387462][ T1778] [ 63.390394][ T1778] __dump_stack+0x21/0x24 [ 63.394819][ T1778] dump_stack_lvl+0x110/0x170 [ 63.399594][ T1778] ? __cfi_dump_stack_lvl+0x8/0x8 [ 63.404810][ T1778] dump_stack+0x15/0x24 [ 63.408974][ T1778] should_fail_ex+0x3d4/0x520 [ 63.413742][ T1778] should_fail+0xb/0x10 [ 63.417884][ T1778] should_fail_usercopy+0x1a/0x20 [ 63.422984][ T1778] _copy_to_user+0x1e/0x90 [ 63.427473][ T1778] bpf_test_finish+0x1b2/0x6c0 [ 63.432233][ T1778] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 63.438214][ T1778] ? convert_skb_to___skb+0x430/0x430 [ 63.443746][ T1778] ? __kasan_check_write+0x14/0x20 [ 63.448844][ T1778] ? _copy_from_user+0x8f/0xc0 [ 63.453781][ T1778] bpf_prog_test_run_xdp+0x80a/0xf10 [ 63.459159][ T1778] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 63.465056][ T1778] ? __kasan_check_write+0x14/0x20 [ 63.470240][ T1778] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 63.476037][ T1778] bpf_prog_test_run+0x3e3/0x640 [ 63.480963][ T1778] ? bpf_prog_query+0x270/0x270 [ 63.485981][ T1778] ? selinux_bpf+0xce/0xf0 [ 63.490561][ T1778] ? security_bpf+0x93/0xb0 [ 63.495078][ T1778] __sys_bpf+0x5ee/0x850 [ 63.499480][ T1778] ? bpf_link_show_fdinfo+0x330/0x330 [ 63.505010][ T1778] ? __cfi_ksys_write+0x10/0x10 [ 63.510119][ T1778] ? debug_smp_processor_id+0x17/0x20 [ 63.515740][ T1778] __x64_sys_bpf+0x7c/0x90 [ 63.520443][ T1778] x64_sys_call+0x488/0x9a0 [ 63.525038][ T1778] do_syscall_64+0x4c/0xa0 [ 63.529618][ T1778] ? clear_bhb_loop+0x30/0x80 [ 63.534379][ T1778] ? clear_bhb_loop+0x30/0x80 [ 63.539123][ T1778] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 63.545267][ T1778] RIP: 0033:0x7f59a419c819 [ 63.549670][ T1778] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 63.569608][ T1778] RSP: 002b:00007f59a5045028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 63.578009][ T1778] RAX: ffffffffffffffda RBX: 00007f59a4415fa0 RCX: 00007f59a419c819 [ 63.586327][ T1778] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 63.594371][ T1778] RBP: 00007f59a5045090 R08: 0000000000000000 R09: 0000000000000000 [ 63.602505][ T1778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 63.610634][ T1778] R13: 00007f59a4416038 R14: 00007f59a4415fa0 R15: 00007fff060eb918 [ 63.618704][ T1778] [ 64.067024][ T1825] FAULT_INJECTION: forcing a failure. [ 64.067024][ T1825] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.096986][ T1825] CPU: 1 PID: 1825 Comm: syz.3.577 Not tainted syzkaller #0 [ 64.104476][ T1825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 64.114883][ T1825] Call Trace: [ 64.118277][ T1825] [ 64.121302][ T1825] __dump_stack+0x21/0x24 [ 64.125650][ T1825] dump_stack_lvl+0x110/0x170 [ 64.130437][ T1825] ? __cfi_dump_stack_lvl+0x8/0x8 [ 64.135825][ T1825] dump_stack+0x15/0x24 [ 64.140086][ T1825] should_fail_ex+0x3d4/0x520 [ 64.144776][ T1825] should_fail+0xb/0x10 [ 64.149028][ T1825] should_fail_usercopy+0x1a/0x20 [ 64.154049][ T1825] _copy_from_user+0x1e/0xc0 [ 64.158717][ T1825] __sys_bpf+0x2a0/0x850 [ 64.163027][ T1825] ? bpf_link_show_fdinfo+0x330/0x330 [ 64.168382][ T1825] ? __cfi_ksys_write+0x10/0x10 [ 64.173488][ T1825] ? debug_smp_processor_id+0x17/0x20 [ 64.178952][ T1825] __x64_sys_bpf+0x7c/0x90 [ 64.183364][ T1825] x64_sys_call+0x488/0x9a0 [ 64.187950][ T1825] do_syscall_64+0x4c/0xa0 [ 64.192354][ T1825] ? clear_bhb_loop+0x30/0x80 [ 64.197109][ T1825] ? clear_bhb_loop+0x30/0x80 [ 64.202342][ T1825] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 64.208256][ T1825] RIP: 0033:0x7f59a419c819 [ 64.212830][ T1825] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 64.233019][ T1825] RSP: 002b:00007f59a5045028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 64.241504][ T1825] RAX: ffffffffffffffda RBX: 00007f59a4415fa0 RCX: 00007f59a419c819 [ 64.249727][ T1825] RDX: 0000000000000050 RSI: 00002000000007c0 RDI: 000000000000000a [ 64.257687][ T1825] RBP: 00007f59a5045090 R08: 0000000000000000 R09: 0000000000000000 [ 64.267046][ T1825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.275401][ T1825] R13: 00007f59a4416038 R14: 00007f59a4415fa0 R15: 00007fff060eb918 [ 64.283634][ T1825] [ 65.258005][ T1927] FAULT_INJECTION: forcing a failure. [ 65.258005][ T1927] name failslab, interval 1, probability 0, space 0, times 0 [ 65.281010][ T1927] CPU: 0 PID: 1927 Comm: syz.0.622 Not tainted syzkaller #0 [ 65.288410][ T1927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 65.298905][ T1927] Call Trace: [ 65.302300][ T1927] [ 65.305286][ T1927] __dump_stack+0x21/0x24 [ 65.309724][ T1927] dump_stack_lvl+0x110/0x170 [ 65.314608][ T1927] ? __cfi_dump_stack_lvl+0x8/0x8 [ 65.319739][ T1927] dump_stack+0x15/0x24 [ 65.323916][ T1927] should_fail_ex+0x3d4/0x520 [ 65.328690][ T1927] __should_failslab+0xac/0xf0 [ 65.333730][ T1927] ? security_prepare_creds+0x4e/0x150 [ 65.339562][ T1927] should_failslab+0x9/0x20 [ 65.344604][ T1927] __kmem_cache_alloc_node+0x3d/0x2c0 [ 65.350068][ T1927] ? security_prepare_creds+0x4e/0x150 [ 65.355640][ T1927] __kmalloc+0xa1/0x1e0 [ 65.359813][ T1927] ? prepare_creds+0x2f/0x640 [ 65.364572][ T1927] security_prepare_creds+0x4e/0x150 [ 65.370039][ T1927] prepare_creds+0x456/0x640 [ 65.374806][ T1927] copy_creds+0xe4/0x640 [ 65.379131][ T1927] copy_process+0x84b/0x3510 [ 65.383978][ T1927] ? __kasan_check_write+0x14/0x20 [ 65.389163][ T1927] ? idle_dummy+0x10/0x10 [ 65.393699][ T1927] kernel_clone+0x22f/0x820 [ 65.398205][ T1927] ? __cfi_kernel_clone+0x10/0x10 [ 65.403235][ T1927] ? __kasan_check_write+0x14/0x20 [ 65.408430][ T1927] ? mutex_unlock+0x8f/0x230 [ 65.413025][ T1927] __x64_sys_clone+0x193/0x200 [ 65.417798][ T1927] ? __cfi___x64_sys_clone+0x10/0x10 [ 65.423164][ T1927] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 65.429233][ T1927] x64_sys_call+0x990/0x9a0 [ 65.433737][ T1927] do_syscall_64+0x4c/0xa0 [ 65.438231][ T1927] ? clear_bhb_loop+0x30/0x80 [ 65.442894][ T1927] ? clear_bhb_loop+0x30/0x80 [ 65.447553][ T1927] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 65.453433][ T1927] RIP: 0033:0x7f26dbb9c819 [ 65.457940][ T1927] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 65.477892][ T1927] RSP: 002b:00007f26da5f6fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 65.486492][ T1927] RAX: ffffffffffffffda RBX: 00007f26dbe15fa0 RCX: 00007f26dbb9c819 [ 65.494637][ T1927] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040800000 [ 65.502950][ T1927] RBP: 00007f26da5f7090 R08: 0000000000000000 R09: 0000000000000000 [ 65.511537][ T1927] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 65.519594][ T1927] R13: 00007f26dbe16038 R14: 00007f26dbe15fa0 R15: 00007fffdb4c2898 [ 65.527749][ T1927] [ 65.752025][ T28] audit: type=1400 audit(1774863543.226:134): avc: denied { create } for pid=1980 comm="syz.3.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 66.339640][ T2048] FAULT_INJECTION: forcing a failure. [ 66.339640][ T2048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 66.407426][ T2048] CPU: 0 PID: 2048 Comm: syz.1.674 Not tainted syzkaller #0 [ 66.414848][ T2048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 66.425176][ T2048] Call Trace: [ 66.428543][ T2048] [ 66.431472][ T2048] __dump_stack+0x21/0x24 [ 66.435830][ T2048] dump_stack_lvl+0x110/0x170 [ 66.440602][ T2048] ? __cfi_dump_stack_lvl+0x8/0x8 [ 66.445913][ T2048] ? format_decode+0x1bb/0x1520 [ 66.451049][ T2048] dump_stack+0x15/0x24 [ 66.455301][ T2048] should_fail_ex+0x3d4/0x520 [ 66.459990][ T2048] should_fail+0xb/0x10 [ 66.464943][ T2048] should_fail_usercopy+0x1a/0x20 [ 66.470077][ T2048] _copy_from_user+0x1e/0xc0 [ 66.474765][ T2048] kstrtouint_from_user+0xda/0x170 [ 66.480239][ T2048] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 66.486321][ T2048] ? __kasan_check_read+0x11/0x20 [ 66.491461][ T2048] ? _copy_to_user+0x72/0x90 [ 66.496183][ T2048] ? simple_read_from_buffer+0x10f/0x160 [ 66.501922][ T2048] proc_fail_nth_write+0x8b/0x200 [ 66.506967][ T2048] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 66.512876][ T2048] ? security_file_permission+0x8a/0xb0 [ 66.518632][ T2048] ? security_file_permission+0x94/0xb0 [ 66.524647][ T2048] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 66.530737][ T2048] vfs_write+0x40e/0xce0 [ 66.535162][ T2048] ? __kasan_check_read+0x11/0x20 [ 66.540887][ T2048] ? __cfi_vfs_write+0x10/0x10 [ 66.546007][ T2048] ? __kasan_check_write+0x14/0x20 [ 66.551143][ T2048] ? mutex_lock+0x93/0x1b0 [ 66.555748][ T2048] ? __cfi_mutex_lock+0x10/0x10 [ 66.560607][ T2048] ? __fdget_pos+0x2cd/0x380 [ 66.565484][ T2048] ? ksys_write+0x71/0x250 [ 66.570003][ T2048] ksys_write+0x149/0x250 [ 66.574516][ T2048] ? __cfi_ksys_write+0x10/0x10 [ 66.579463][ T2048] ? debug_smp_processor_id+0x17/0x20 [ 66.584943][ T2048] __x64_sys_write+0x7b/0x90 [ 66.589716][ T2048] x64_sys_call+0x27b/0x9a0 [ 66.594510][ T2048] do_syscall_64+0x4c/0xa0 [ 66.599030][ T2048] ? clear_bhb_loop+0x30/0x80 [ 66.604512][ T2048] ? clear_bhb_loop+0x30/0x80 [ 66.609289][ T2048] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 66.615358][ T2048] RIP: 0033:0x7f0523d5d04e [ 66.619977][ T2048] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 66.640039][ T2048] RSP: 002b:00007f0524cebfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 66.648902][ T2048] RAX: ffffffffffffffda RBX: 00007f0524cec6c0 RCX: 00007f0523d5d04e [ 66.657139][ T2048] RDX: 0000000000000001 RSI: 00007f0524cec0a0 RDI: 0000000000000004 [ 66.665467][ T2048] RBP: 00007f0524cec090 R08: 0000000000000000 R09: 0000000000000000 [ 66.673792][ T2048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 66.682303][ T2048] R13: 00007f0524016038 R14: 00007f0524015fa0 R15: 00007ffd9e066828 [ 66.690648][ T2048] [ 66.928539][ T2081] device syzkaller0 left promiscuous mode [ 66.996855][ T2079] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.735107][ T2161] device syzkaller0 entered promiscuous mode [ 68.334427][ T2216] bridge0: port 3(gretap0) entered blocking state [ 68.360022][ T2216] bridge0: port 3(gretap0) entered disabled state [ 68.367638][ T2216] device gretap0 entered promiscuous mode [ 68.373709][ T2216] bridge0: port 3(gretap0) entered blocking state [ 68.380182][ T2216] bridge0: port 3(gretap0) entered forwarding state [ 68.703599][ T28] audit: type=1400 audit(1774863546.176:135): avc: denied { create } for pid=2211 comm="syz.1.745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 69.388440][ T2289] FAULT_INJECTION: forcing a failure. [ 69.388440][ T2289] name failslab, interval 1, probability 0, space 0, times 0 [ 69.412461][ T2289] CPU: 0 PID: 2289 Comm: syz.1.777 Not tainted syzkaller #0 [ 69.419781][ T2289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 69.430012][ T2289] Call Trace: [ 69.433384][ T2289] [ 69.436316][ T2289] __dump_stack+0x21/0x24 [ 69.440828][ T2289] dump_stack_lvl+0x110/0x170 [ 69.445598][ T2289] ? __cfi_dump_stack_lvl+0x8/0x8 [ 69.450826][ T2289] ? avc_has_perm_noaudit+0x30b/0x490 [ 69.456219][ T2289] dump_stack+0x15/0x24 [ 69.460410][ T2289] should_fail_ex+0x3d4/0x520 [ 69.465186][ T2289] __should_failslab+0xac/0xf0 [ 69.470047][ T2289] should_failslab+0x9/0x20 [ 69.474917][ T2289] slab_pre_alloc_hook+0x30/0x1e0 [ 69.480045][ T2289] ? selinux_inode_permission+0x415/0x5f0 [ 69.485777][ T2289] ? step_into+0x42f/0xf40 [ 69.490209][ T2289] kmem_cache_alloc_lru+0x49/0x280 [ 69.495336][ T2289] ? __d_alloc+0x34/0x6c0 [ 69.499683][ T2289] __d_alloc+0x34/0x6c0 [ 69.503847][ T2289] ? __cfi__raw_spin_lock+0x10/0x10 [ 69.509282][ T2289] ? down_read+0xa6/0xf0 [ 69.513527][ T2289] d_alloc_parallel+0xe2/0x12e0 [ 69.518491][ T2289] ? __kasan_check_write+0x14/0x20 [ 69.523618][ T2289] ? rwsem_read_trylock+0x2ae/0x640 [ 69.528933][ T2289] ? downgrade_write+0x370/0x370 [ 69.533975][ T2289] ? __d_lookup+0x51c/0x5b0 [ 69.538572][ T2289] ? __cfi_d_alloc_parallel+0x10/0x10 [ 69.543954][ T2289] ? down_read+0xa6/0xf0 [ 69.548400][ T2289] ? __cfi_down_read+0x10/0x10 [ 69.553264][ T2289] path_openat+0x961/0x2f80 [ 69.557875][ T2289] ? __kasan_slab_alloc+0x72/0x80 [ 69.562995][ T2289] ? do_filp_open+0x430/0x430 [ 69.567685][ T2289] do_filp_open+0x1f1/0x430 [ 69.572395][ T2289] ? __cfi_do_filp_open+0x10/0x10 [ 69.577426][ T2289] ? __cfi_kfree_link+0x10/0x10 [ 69.582365][ T2289] ? alloc_fd+0x4e6/0x590 [ 69.586693][ T2289] do_sys_openat2+0x15e/0x810 [ 69.591452][ T2289] ? hw_breakpoint_exceptions_notify+0x182/0x550 [ 69.597865][ T2289] ? do_sys_open+0xe0/0xe0 [ 69.602353][ T2289] ? notify_die+0x18d/0x1e0 [ 69.606839][ T2289] ? __cfi_notify_die+0x10/0x10 [ 69.611963][ T2289] __x64_sys_openat+0x136/0x160 [ 69.616820][ T2289] x64_sys_call+0x783/0x9a0 [ 69.621570][ T2289] do_syscall_64+0x4c/0xa0 [ 69.625985][ T2289] ? clear_bhb_loop+0x30/0x80 [ 69.630646][ T2289] ? clear_bhb_loop+0x30/0x80 [ 69.635578][ T2289] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 69.641639][ T2289] RIP: 0033:0x7f0523d5d04e [ 69.646042][ T2289] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 69.665807][ T2289] RSP: 002b:00007f0524cebec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 69.674306][ T2289] RAX: ffffffffffffffda RBX: 00007f0524cec6c0 RCX: 00007f0523d5d04e [ 69.682375][ T2289] RDX: 0000000000000002 RSI: 00007f0524cebf90 RDI: ffffffffffffff9c [ 69.690432][ T2289] RBP: 00007f0524cec090 R08: 0000000000000000 R09: 0000000000000000 [ 69.698485][ T2289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.706532][ T2289] R13: 00007f0524016038 R14: 00007f0524015fa0 R15: 00007ffd9e066828 [ 69.714670][ T2289] [ 70.531212][ T2374] device syzkaller0 entered promiscuous mode [ 70.783777][ T2404] device wg2 entered promiscuous mode [ 70.840611][ T2408] FAULT_INJECTION: forcing a failure. [ 70.840611][ T2408] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 70.859343][ T2408] CPU: 1 PID: 2408 Comm: syz.2.824 Not tainted syzkaller #0 [ 70.866667][ T2408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 70.877245][ T2408] Call Trace: [ 70.880696][ T2408] [ 70.883186][ T28] audit: type=1400 audit(1774863548.346:136): avc: denied { create } for pid=2409 comm="syz.4.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 70.883614][ T2408] __dump_stack+0x21/0x24 [ 70.908968][ T2408] dump_stack_lvl+0x110/0x170 [ 70.913840][ T2408] ? __cfi_dump_stack_lvl+0x8/0x8 [ 70.918878][ T2408] ? migrate_enable+0x1af/0x2a0 [ 70.923725][ T2408] ? __cfi_migrate_enable+0x10/0x10 [ 70.929081][ T2408] dump_stack+0x15/0x24 [ 70.933355][ T2408] should_fail_ex+0x3d4/0x520 [ 70.938030][ T2408] should_fail+0xb/0x10 [ 70.942347][ T2408] should_fail_usercopy+0x1a/0x20 [ 70.947462][ T2408] _copy_to_user+0x1e/0x90 [ 70.951890][ T2408] bpf_test_finish+0x1b2/0x6c0 [ 70.956695][ T2408] ? convert_skb_to___skb+0x430/0x430 [ 70.962071][ T2408] bpf_prog_test_run_skb+0xce6/0x12c0 [ 70.967548][ T2408] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 70.973526][ T2408] bpf_prog_test_run+0x3e3/0x640 [ 70.978591][ T2408] ? bpf_prog_query+0x270/0x270 [ 70.983443][ T2408] ? selinux_bpf+0xce/0xf0 [ 70.988200][ T2408] ? security_bpf+0x93/0xb0 [ 70.992782][ T2408] __sys_bpf+0x5ee/0x850 [ 70.997100][ T2408] ? bpf_link_show_fdinfo+0x330/0x330 [ 71.002817][ T2408] ? __cfi_ksys_write+0x10/0x10 [ 71.007781][ T2408] ? debug_smp_processor_id+0x17/0x20 [ 71.013241][ T2408] __x64_sys_bpf+0x7c/0x90 [ 71.017741][ T2408] x64_sys_call+0x488/0x9a0 [ 71.022653][ T2408] do_syscall_64+0x4c/0xa0 [ 71.027325][ T2408] ? clear_bhb_loop+0x30/0x80 [ 71.032056][ T2408] ? clear_bhb_loop+0x30/0x80 [ 71.036889][ T2408] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 71.043122][ T2408] RIP: 0033:0x7fd62299c819 [ 71.047630][ T2408] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 71.068262][ T2408] RSP: 002b:00007fd62394d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 71.076756][ T2408] RAX: ffffffffffffffda RBX: 00007fd622c15fa0 RCX: 00007fd62299c819 [ 71.085396][ T2408] RDX: 0000000000000022 RSI: 0000200000001bc0 RDI: 000000000000000a [ 71.093660][ T2408] RBP: 00007fd62394d090 R08: 0000000000000000 R09: 0000000000000000 [ 71.102245][ T2408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.110303][ T2408] R13: 00007fd622c16038 R14: 00007fd622c15fa0 R15: 00007ffec415ad78 [ 71.118546][ T2408] [ 71.878649][ T2472] FAULT_INJECTION: forcing a failure. [ 71.878649][ T2472] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 71.892033][ T2472] CPU: 0 PID: 2472 Comm: syz.3.849 Not tainted syzkaller #0 [ 71.899411][ T2472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 71.909472][ T2472] Call Trace: [ 71.912785][ T2472] [ 71.915814][ T2472] __dump_stack+0x21/0x24 [ 71.920153][ T2472] dump_stack_lvl+0x110/0x170 [ 71.924948][ T2472] ? __cfi_dump_stack_lvl+0x8/0x8 [ 71.929984][ T2472] ? exc_page_fault+0x5e/0xb0 [ 71.935020][ T2472] dump_stack+0x15/0x24 [ 71.939184][ T2472] should_fail_ex+0x3d4/0x520 [ 71.943954][ T2472] should_fail+0xb/0x10 [ 71.948204][ T2472] should_fail_usercopy+0x1a/0x20 [ 71.953765][ T2472] strncpy_from_user+0x24/0x2d0 [ 71.959047][ T2472] strncpy_from_user_nofault+0x73/0x150 [ 71.964702][ T2472] bpf_probe_read_user_str+0x2a/0x70 [ 71.970102][ T2472] bpf_prog_1e8d05505ca6b5c0+0x59/0x5b [ 71.975765][ T2472] bpf_flow_dissect+0x120/0x3f0 [ 71.980808][ T2472] ? bpf_test_timer_continue+0x147/0x4a0 [ 71.986676][ T2472] bpf_prog_test_run_flow_dissector+0x431/0x640 [ 71.992953][ T2472] ? __cfi_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 71.999909][ T2472] ? __kasan_check_write+0x14/0x20 [ 72.005116][ T2472] ? __cfi_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 72.012031][ T2472] bpf_prog_test_run+0x3e3/0x640 [ 72.016979][ T2472] ? bpf_prog_query+0x270/0x270 [ 72.021872][ T2472] ? selinux_bpf+0xce/0xf0 [ 72.026379][ T2472] ? security_bpf+0x93/0xb0 [ 72.030992][ T2472] __sys_bpf+0x5ee/0x850 [ 72.035253][ T2472] ? bpf_link_show_fdinfo+0x330/0x330 [ 72.040735][ T2472] ? __cfi_ksys_write+0x10/0x10 [ 72.045890][ T2472] ? debug_smp_processor_id+0x17/0x20 [ 72.051281][ T2472] __x64_sys_bpf+0x7c/0x90 [ 72.055722][ T2472] x64_sys_call+0x488/0x9a0 [ 72.060413][ T2472] do_syscall_64+0x4c/0xa0 [ 72.065192][ T2472] ? clear_bhb_loop+0x30/0x80 [ 72.069874][ T2472] ? clear_bhb_loop+0x30/0x80 [ 72.074652][ T2472] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 72.080632][ T2472] RIP: 0033:0x7f59a419c819 [ 72.085141][ T2472] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 72.105858][ T2472] RSP: 002b:00007f59a5045028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 72.114457][ T2472] RAX: ffffffffffffffda RBX: 00007f59a4415fa0 RCX: 00007f59a419c819 [ 72.122525][ T2472] RDX: 0000000000000050 RSI: 00002000000004c0 RDI: 000000000000000a [ 72.130590][ T2472] RBP: 00007f59a5045090 R08: 0000000000000000 R09: 0000000000000000 [ 72.138568][ T2472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 72.146555][ T2472] R13: 00007f59a4416038 R14: 00007f59a4415fa0 R15: 00007fff060eb918 [ 72.154834][ T2472] [ 73.414965][ T2569] FAULT_INJECTION: forcing a failure. [ 73.414965][ T2569] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 73.495560][ T2569] CPU: 1 PID: 2569 Comm: syz.0.885 Not tainted syzkaller #0 [ 73.502970][ T2569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 73.513465][ T2569] Call Trace: [ 73.517113][ T2569] [ 73.520226][ T2569] __dump_stack+0x21/0x24 [ 73.524570][ T2569] dump_stack_lvl+0x110/0x170 [ 73.529437][ T2569] ? __cfi_dump_stack_lvl+0x8/0x8 [ 73.534570][ T2569] ? unwind_get_return_address+0x4d/0x90 [ 73.540477][ T2569] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 73.546737][ T2569] dump_stack+0x15/0x24 [ 73.550966][ T2569] should_fail_ex+0x3d4/0x520 [ 73.555840][ T2569] should_fail_alloc_page+0x61/0x90 [ 73.561142][ T2569] prepare_alloc_pages+0x148/0x600 [ 73.566782][ T2569] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 73.572358][ T2569] ? kasan_set_track+0x60/0x70 [ 73.577319][ T2569] ? kasan_set_track+0x4b/0x70 [ 73.582185][ T2569] ? kasan_save_alloc_info+0x25/0x30 [ 73.587575][ T2569] ? __kasan_slab_alloc+0x72/0x80 [ 73.592703][ T2569] ? slab_post_alloc_hook+0x4f/0x2d0 [ 73.598218][ T2569] __alloc_pages+0x15b/0x610 [ 73.602832][ T2569] ? __cfi___alloc_pages+0x10/0x10 [ 73.608141][ T2569] __get_free_pages+0xe/0x30 [ 73.612842][ T2569] kasan_populate_vmalloc_pte+0x29/0x120 [ 73.618840][ T2569] __apply_to_page_range+0x8de/0xc80 [ 73.624422][ T2569] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 73.630933][ T2569] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 73.637271][ T2569] apply_to_page_range+0x3b/0x50 [ 73.642330][ T2569] kasan_populate_vmalloc+0x60/0x70 [ 73.647713][ T2569] alloc_vmap_area+0x1779/0x18b0 [ 73.652844][ T2569] ? vm_map_ram+0x930/0x930 [ 73.657349][ T2569] ? __kasan_kmalloc+0x95/0xb0 [ 73.662396][ T2569] ? kmalloc_node_trace+0x3d/0xb0 [ 73.667701][ T2569] __get_vm_area_node+0x160/0x360 [ 73.672905][ T2569] __vmalloc_node_range+0x326/0x1430 [ 73.678283][ T2569] ? stack_map_alloc+0x318/0x530 [ 73.683316][ T2569] ? memcpy+0x56/0x70 [ 73.687308][ T2569] ? __cfi___vmalloc_node_range+0x10/0x10 [ 73.693033][ T2569] ? cap_capable+0x1aa/0x230 [ 73.697800][ T2569] ? security_capable+0x99/0xc0 [ 73.702919][ T2569] bpf_map_area_alloc+0xd7/0xe0 [ 73.707934][ T2569] ? stack_map_alloc+0x318/0x530 [ 73.712946][ T2569] stack_map_alloc+0x318/0x530 [ 73.717715][ T2569] map_create+0x49c/0xd80 [ 73.722027][ T2569] __sys_bpf+0x34e/0x850 [ 73.726350][ T2569] ? bpf_link_show_fdinfo+0x330/0x330 [ 73.731884][ T2569] ? __cfi_ksys_write+0x10/0x10 [ 73.736806][ T2569] ? do_user_addr_fault+0x9ac/0x1050 [ 73.742080][ T2569] ? debug_smp_processor_id+0x17/0x20 [ 73.747438][ T2569] __x64_sys_bpf+0x7c/0x90 [ 73.751972][ T2569] x64_sys_call+0x488/0x9a0 [ 73.756459][ T2569] do_syscall_64+0x4c/0xa0 [ 73.760917][ T2569] ? clear_bhb_loop+0x30/0x80 [ 73.765907][ T2569] ? clear_bhb_loop+0x30/0x80 [ 73.770933][ T2569] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 73.777193][ T2569] RIP: 0033:0x7f26dbb9c819 [ 73.781709][ T2569] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 73.802170][ T2569] RSP: 002b:00007f26da5f7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 73.810747][ T2569] RAX: ffffffffffffffda RBX: 00007f26dbe15fa0 RCX: 00007f26dbb9c819 [ 73.819055][ T2569] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 0000000000000000 [ 73.827273][ T2569] RBP: 00007f26da5f7090 R08: 0000000000000000 R09: 0000000000000000 [ 73.835817][ T2569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.844344][ T2569] R13: 00007f26dbe16038 R14: 00007f26dbe15fa0 R15: 00007fffdb4c2898 [ 73.852790][ T2569] [ 74.687998][ T2636] device syzkaller0 entered promiscuous mode [ 76.614893][ T2730] FAULT_INJECTION: forcing a failure. [ 76.614893][ T2730] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 76.737420][ T2730] CPU: 1 PID: 2730 Comm: syz.4.949 Not tainted syzkaller #0 [ 76.744760][ T2730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 76.754993][ T2730] Call Trace: [ 76.758504][ T2730] [ 76.761513][ T2730] __dump_stack+0x21/0x24 [ 76.766649][ T2730] dump_stack_lvl+0x110/0x170 [ 76.771443][ T2730] ? __cfi_dump_stack_lvl+0x8/0x8 [ 76.776494][ T2730] ? migrate_enable+0x1af/0x2a0 [ 76.781980][ T2730] ? __cfi_migrate_enable+0x10/0x10 [ 76.787465][ T2730] dump_stack+0x15/0x24 [ 76.791643][ T2730] should_fail_ex+0x3d4/0x520 [ 76.797130][ T2730] should_fail+0xb/0x10 [ 76.801670][ T2730] should_fail_usercopy+0x1a/0x20 [ 76.806717][ T2730] _copy_to_user+0x1e/0x90 [ 76.811233][ T2730] bpf_test_finish+0x1b2/0x6c0 [ 76.816180][ T2730] ? convert_skb_to___skb+0x430/0x430 [ 76.821814][ T2730] bpf_prog_test_run_skb+0xce6/0x12c0 [ 76.827503][ T2730] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 76.833677][ T2730] bpf_prog_test_run+0x3e3/0x640 [ 76.838727][ T2730] ? bpf_prog_query+0x270/0x270 [ 76.843769][ T2730] ? selinux_bpf+0xce/0xf0 [ 76.848412][ T2730] ? security_bpf+0x93/0xb0 [ 76.853216][ T2730] __sys_bpf+0x5ee/0x850 [ 76.857565][ T2730] ? bpf_link_show_fdinfo+0x330/0x330 [ 76.863038][ T2730] ? __cfi_ksys_write+0x10/0x10 [ 76.867999][ T2730] ? debug_smp_processor_id+0x17/0x20 [ 76.873643][ T2730] __x64_sys_bpf+0x7c/0x90 [ 76.878082][ T2730] x64_sys_call+0x488/0x9a0 [ 76.882785][ T2730] do_syscall_64+0x4c/0xa0 [ 76.887402][ T2730] ? clear_bhb_loop+0x30/0x80 [ 76.892092][ T2730] ? clear_bhb_loop+0x30/0x80 [ 76.897146][ T2730] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 76.903411][ T2730] RIP: 0033:0x7feb09b9c819 [ 76.908007][ T2730] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 76.927940][ T2730] RSP: 002b:00007feb0aa82028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 76.936727][ T2730] RAX: ffffffffffffffda RBX: 00007feb09e15fa0 RCX: 00007feb09b9c819 [ 76.944795][ T2730] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 76.953032][ T2730] RBP: 00007feb0aa82090 R08: 0000000000000000 R09: 0000000000000000 [ 76.961297][ T2730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.969445][ T2730] R13: 00007feb09e16038 R14: 00007feb09e15fa0 R15: 00007fffabdf5278 [ 76.977934][ T2730] [ 77.636448][ T2762] device syzkaller0 left promiscuous mode [ 78.215905][ T2805] FAULT_INJECTION: forcing a failure. [ 78.215905][ T2805] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 78.232338][ T2812] FAULT_INJECTION: forcing a failure. [ 78.232338][ T2812] name failslab, interval 1, probability 0, space 0, times 0 [ 78.250251][ T2805] CPU: 1 PID: 2805 Comm: syz.3.980 Not tainted syzkaller #0 [ 78.257591][ T2805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 78.267891][ T2805] Call Trace: [ 78.271258][ T2805] [ 78.274260][ T2805] __dump_stack+0x21/0x24 [ 78.278680][ T2805] dump_stack_lvl+0x110/0x170 [ 78.283498][ T2805] ? __cfi_dump_stack_lvl+0x8/0x8 [ 78.288946][ T2805] dump_stack+0x15/0x24 [ 78.293293][ T2805] should_fail_ex+0x3d4/0x520 [ 78.298245][ T2805] should_fail+0xb/0x10 [ 78.302584][ T2805] should_fail_usercopy+0x1a/0x20 [ 78.307878][ T2805] _copy_to_user+0x1e/0x90 [ 78.312460][ T2805] simple_read_from_buffer+0xe9/0x160 [ 78.318088][ T2805] proc_fail_nth_read+0x1a6/0x220 [ 78.323117][ T2805] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 78.328867][ T2805] ? security_file_permission+0x94/0xb0 [ 78.334678][ T2805] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 78.340310][ T2805] vfs_read+0x27a/0x910 [ 78.344657][ T2805] ? __cfi_vfs_read+0x10/0x10 [ 78.349406][ T2805] ? __kasan_check_write+0x14/0x20 [ 78.354768][ T2805] ? mutex_lock+0x93/0x1b0 [ 78.359281][ T2805] ? __cfi_mutex_lock+0x10/0x10 [ 78.364529][ T2805] ? __fdget_pos+0x2cd/0x380 [ 78.369305][ T2805] ? ksys_read+0x71/0x250 [ 78.373617][ T2805] ksys_read+0x149/0x250 [ 78.377842][ T2805] ? __cfi_ksys_read+0x10/0x10 [ 78.382964][ T2805] ? fpregs_restore_userregs+0x128/0x260 [ 78.388582][ T2805] __x64_sys_read+0x7b/0x90 [ 78.393161][ T2805] x64_sys_call+0x2f/0x9a0 [ 78.397739][ T2805] do_syscall_64+0x4c/0xa0 [ 78.402144][ T2805] ? clear_bhb_loop+0x30/0x80 [ 78.406890][ T2805] ? clear_bhb_loop+0x30/0x80 [ 78.411635][ T2805] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 78.417519][ T2805] RIP: 0033:0x7f59a415d04e [ 78.422176][ T2805] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 78.442030][ T2805] RSP: 002b:00007f59a5044fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 78.450659][ T2805] RAX: ffffffffffffffda RBX: 00007f59a50456c0 RCX: 00007f59a415d04e [ 78.458705][ T2805] RDX: 000000000000000f RSI: 00007f59a50450a0 RDI: 0000000000000006 [ 78.466747][ T2805] RBP: 00007f59a5045090 R08: 0000000000000000 R09: 0000000000000000 [ 78.475402][ T2805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 78.483974][ T2805] R13: 00007f59a4416038 R14: 00007f59a4415fa0 R15: 00007fff060eb918 [ 78.492201][ T2805] [ 78.495390][ T2812] CPU: 0 PID: 2812 Comm: syz.2.976 Not tainted syzkaller #0 [ 78.503295][ T2812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 78.513517][ T2812] Call Trace: [ 78.516834][ T2812] [ 78.520182][ T2812] __dump_stack+0x21/0x24 [ 78.524724][ T2812] dump_stack_lvl+0x110/0x170 [ 78.529565][ T2812] ? __cfi_dump_stack_lvl+0x8/0x8 [ 78.534767][ T2812] ? avc_has_perm+0x163/0x250 [ 78.539545][ T2812] dump_stack+0x15/0x24 [ 78.543892][ T2812] should_fail_ex+0x3d4/0x520 [ 78.548832][ T2812] __should_failslab+0xac/0xf0 [ 78.553843][ T2812] should_failslab+0x9/0x20 [ 78.558421][ T2812] slab_pre_alloc_hook+0x30/0x1e0 [ 78.563515][ T2812] kmem_cache_alloc_lru+0x49/0x280 [ 78.568785][ T2812] ? sock_alloc_inode+0x28/0xc0 [ 78.573814][ T2812] sock_alloc_inode+0x28/0xc0 [ 78.578930][ T2812] ? __cfi_sock_alloc_inode+0x10/0x10 [ 78.584472][ T2812] new_inode_pseudo+0x70/0x1f0 [ 78.589225][ T2812] __sock_create+0x12c/0x7c0 [ 78.594073][ T2812] __sys_socketpair+0x218/0x5b0 [ 78.598930][ T2812] __x64_sys_socketpair+0x9b/0xb0 [ 78.604128][ T2812] x64_sys_call+0x6e/0x9a0 [ 78.608626][ T2812] do_syscall_64+0x4c/0xa0 [ 78.613146][ T2812] ? clear_bhb_loop+0x30/0x80 [ 78.617911][ T2812] ? clear_bhb_loop+0x30/0x80 [ 78.622669][ T2812] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 78.628635][ T2812] RIP: 0033:0x7fd62299c819 [ 78.633120][ T2812] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 78.653061][ T2812] RSP: 002b:00007fd62394d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 78.661653][ T2812] RAX: ffffffffffffffda RBX: 00007fd622c15fa0 RCX: 00007fd62299c819 [ 78.669700][ T2812] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000018 [ 78.677747][ T2812] RBP: 00007fd62394d090 R08: 0000000000000000 R09: 0000000000000000 [ 78.685963][ T2812] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.693914][ T2812] R13: 00007fd622c16038 R14: 00007fd622c15fa0 R15: 00007ffec415ad78 [ 78.702233][ T2812] [ 78.710076][ T2812] socket: no more sockets [ 78.819513][ T2830] FAULT_INJECTION: forcing a failure. [ 78.819513][ T2830] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 78.877404][ T2830] CPU: 0 PID: 2830 Comm: syz.3.990 Not tainted syzkaller #0 [ 78.885335][ T2830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 78.895712][ T2830] Call Trace: [ 78.898996][ T2830] [ 78.902102][ T2830] __dump_stack+0x21/0x24 [ 78.906526][ T2830] dump_stack_lvl+0x110/0x170 [ 78.911407][ T2830] ? __cfi_dump_stack_lvl+0x8/0x8 [ 78.916457][ T2830] dump_stack+0x15/0x24 [ 78.920797][ T2830] should_fail_ex+0x3d4/0x520 [ 78.925725][ T2830] should_fail+0xb/0x10 [ 78.929978][ T2830] should_fail_usercopy+0x1a/0x20 [ 78.935356][ T2830] _copy_from_user+0x1e/0xc0 [ 78.940131][ T2830] __sys_bpf+0x2a0/0x850 [ 78.944727][ T2830] ? bpf_link_show_fdinfo+0x330/0x330 [ 78.950284][ T2830] ? __cfi_ksys_write+0x10/0x10 [ 78.955591][ T2830] ? debug_smp_processor_id+0x17/0x20 [ 78.961668][ T2830] __x64_sys_bpf+0x7c/0x90 [ 78.966880][ T2830] x64_sys_call+0x488/0x9a0 [ 78.972070][ T2830] do_syscall_64+0x4c/0xa0 [ 78.976845][ T2830] ? clear_bhb_loop+0x30/0x80 [ 78.981800][ T2830] ? clear_bhb_loop+0x30/0x80 [ 78.986739][ T2830] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 78.992922][ T2830] RIP: 0033:0x7f59a419c819 [ 78.997543][ T2830] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 79.017682][ T2830] RSP: 002b:00007f59a5045028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 79.026608][ T2830] RAX: ffffffffffffffda RBX: 00007f59a4415fa0 RCX: 00007f59a419c819 [ 79.034568][ T2830] RDX: 0000000000000050 RSI: 0000200000000440 RDI: 000000000000000a [ 79.043232][ T2830] RBP: 00007f59a5045090 R08: 0000000000000000 R09: 0000000000000000 [ 79.051369][ T2830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.059416][ T2830] R13: 00007f59a4416038 R14: 00007f59a4415fa0 R15: 00007fff060eb918 [ 79.067556][ T2830] [ 79.304635][ T2861] device syzkaller0 entered promiscuous mode [ 80.028834][ T28] audit: type=1400 audit(1774863557.506:137): avc: denied { attach_queue } for pid=2924 comm="syz.1.1026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 81.649464][ T3005] device syzkaller0 entered promiscuous mode [ 81.706970][ T3000] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.772815][ T3000] device bridge0 left promiscuous mode [ 81.795964][ T3016] FAULT_INJECTION: forcing a failure. [ 81.795964][ T3016] name failslab, interval 1, probability 0, space 0, times 0 [ 81.809074][ T3016] CPU: 1 PID: 3016 Comm: syz.1.1060 Not tainted syzkaller #0 [ 81.816970][ T3016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 81.827556][ T3016] Call Trace: [ 81.831376][ T3016] [ 81.834302][ T3016] __dump_stack+0x21/0x24 [ 81.838648][ T3016] dump_stack_lvl+0x110/0x170 [ 81.843347][ T3016] ? __cfi_dump_stack_lvl+0x8/0x8 [ 81.848391][ T3016] ? kfree_skbmem+0x10c/0x180 [ 81.853079][ T3016] ? kfree_skb_reason+0xdc/0x230 [ 81.858062][ T3016] dump_stack+0x15/0x24 [ 81.862327][ T3016] should_fail_ex+0x3d4/0x520 [ 81.867121][ T3016] ? dst_alloc+0x16a/0x1e0 [ 81.871727][ T3016] __should_failslab+0xac/0xf0 [ 81.876593][ T3016] should_failslab+0x9/0x20 [ 81.881113][ T3016] kmem_cache_alloc+0x3b/0x330 [ 81.886243][ T3016] dst_alloc+0x16a/0x1e0 [ 81.890815][ T3016] ip_route_output_key_hash_rcu+0x1300/0x2030 [ 81.897072][ T3016] ip_route_output_flow+0x143/0x300 [ 81.902370][ T3016] ? __cfi_ip_route_output_flow+0x10/0x10 [ 81.908109][ T3016] ip_tunnel_xmit+0xb66/0x27a0 [ 81.913236][ T3016] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 81.918518][ T3016] ? unwind_get_return_address+0x4d/0x90 [ 81.924483][ T3016] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 81.930766][ T3016] ? gre_build_header+0x25d/0x9b0 [ 81.935813][ T3016] ipgre_xmit+0x80b/0xb90 [ 81.940151][ T3016] dev_hard_start_xmit+0x20b/0x750 [ 81.945264][ T3016] __dev_queue_xmit+0x195d/0x3470 [ 81.950293][ T3016] ? __dev_queue_xmit+0x258/0x3470 [ 81.955399][ T3016] ? __cfi___dev_queue_xmit+0x10/0x10 [ 81.960806][ T3016] ? __kasan_check_write+0x14/0x20 [ 81.966018][ T3016] ? skb_release_data+0x1d2/0x890 [ 81.971056][ T3016] ? skb_ensure_writable+0x2f8/0x470 [ 81.976347][ T3016] ? __kasan_check_write+0x14/0x20 [ 81.981460][ T3016] ? pskb_expand_head+0xc4a/0x1210 [ 81.986575][ T3016] __bpf_redirect+0x8dd/0x1130 [ 81.991435][ T3016] bpf_clone_redirect+0x332/0x500 [ 81.996557][ T3016] bpf_prog_208b094576c80b22+0x56/0x5b [ 82.002024][ T3016] ? kasan_set_track+0x60/0x70 [ 82.006789][ T3016] ? kasan_set_track+0x4b/0x70 [ 82.011555][ T3016] ? kasan_save_alloc_info+0x25/0x30 [ 82.017025][ T3016] ? __kasan_slab_alloc+0x72/0x80 [ 82.022139][ T3016] ? slab_post_alloc_hook+0x4f/0x2d0 [ 82.027435][ T3016] ? kmem_cache_alloc+0x16e/0x330 [ 82.032558][ T3016] ? build_skb+0x2a/0x220 [ 82.036908][ T3016] ? bpf_prog_test_run_skb+0x39b/0x12c0 [ 82.042461][ T3016] ? bpf_prog_test_run+0x3e3/0x640 [ 82.047586][ T3016] ? __sys_bpf+0x5ee/0x850 [ 82.052263][ T3016] ? __x64_sys_bpf+0x7c/0x90 [ 82.057032][ T3016] ? x64_sys_call+0x488/0x9a0 [ 82.062147][ T3016] ? do_syscall_64+0x4c/0xa0 [ 82.066836][ T3016] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 82.072995][ T3016] ? __kasan_check_read+0x11/0x20 [ 82.078206][ T3016] ? kvm_sched_clock_read+0x18/0x40 [ 82.083414][ T3016] ? sched_clock+0x9/0x10 [ 82.088522][ T3016] bpf_test_run+0x55e/0x940 [ 82.093391][ T3016] ? convert___skb_to_skb+0x5b0/0x5b0 [ 82.099037][ T3016] ? __cfi_eth_type_trans+0x10/0x10 [ 82.104409][ T3016] ? convert___skb_to_skb+0x40/0x5b0 [ 82.109787][ T3016] bpf_prog_test_run_skb+0xafb/0x12c0 [ 82.115764][ T3016] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 82.121840][ T3016] bpf_prog_test_run+0x3e3/0x640 [ 82.127139][ T3016] ? bpf_prog_query+0x270/0x270 [ 82.132095][ T3016] ? selinux_bpf+0xce/0xf0 [ 82.136608][ T3016] ? security_bpf+0x93/0xb0 [ 82.141109][ T3016] __sys_bpf+0x5ee/0x850 [ 82.145437][ T3016] ? bpf_link_show_fdinfo+0x330/0x330 [ 82.150820][ T3016] ? __cfi_ksys_write+0x10/0x10 [ 82.155682][ T3016] ? debug_smp_processor_id+0x17/0x20 [ 82.161126][ T3016] __x64_sys_bpf+0x7c/0x90 [ 82.165745][ T3016] x64_sys_call+0x488/0x9a0 [ 82.170258][ T3016] do_syscall_64+0x4c/0xa0 [ 82.174771][ T3016] ? clear_bhb_loop+0x30/0x80 [ 82.179633][ T3016] ? clear_bhb_loop+0x30/0x80 [ 82.184583][ T3016] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 82.190636][ T3016] RIP: 0033:0x7f0523d9c819 [ 82.195139][ T3016] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 82.215117][ T3016] RSP: 002b:00007f0524cec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 82.223625][ T3016] RAX: ffffffffffffffda RBX: 00007f0524015fa0 RCX: 00007f0523d9c819 [ 82.231596][ T3016] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 82.239733][ T3016] RBP: 00007f0524cec090 R08: 0000000000000000 R09: 0000000000000000 [ 82.248089][ T3016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 82.256415][ T3016] R13: 00007f0524016038 R14: 00007f0524015fa0 R15: 00007ffd9e066828 [ 82.264832][ T3016] [ 82.793490][ T3038] FAULT_INJECTION: forcing a failure. [ 82.793490][ T3038] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.814711][ T3038] CPU: 1 PID: 3038 Comm: syz.0.1067 Not tainted syzkaller #0 [ 82.822877][ T3038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 82.834483][ T3038] Call Trace: [ 82.837851][ T3038] [ 82.840981][ T3038] __dump_stack+0x21/0x24 [ 82.846354][ T3038] dump_stack_lvl+0x110/0x170 [ 82.851671][ T3038] ? __cfi_dump_stack_lvl+0x8/0x8 [ 82.856953][ T3038] dump_stack+0x15/0x24 [ 82.861223][ T3038] should_fail_ex+0x3d4/0x520 [ 82.866341][ T3038] should_fail+0xb/0x10 [ 82.871042][ T3038] should_fail_usercopy+0x1a/0x20 [ 82.876068][ T3038] _copy_to_user+0x1e/0x90 [ 82.880561][ T3038] simple_read_from_buffer+0xe9/0x160 [ 82.885923][ T3038] proc_fail_nth_read+0x1a6/0x220 [ 82.891138][ T3038] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 82.896776][ T3038] ? security_file_permission+0x94/0xb0 [ 82.902483][ T3038] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 82.908098][ T3038] vfs_read+0x27a/0x910 [ 82.912421][ T3038] ? __cfi_vfs_read+0x10/0x10 [ 82.917347][ T3038] ? __kasan_check_write+0x14/0x20 [ 82.922447][ T3038] ? mutex_lock+0x93/0x1b0 [ 82.926941][ T3038] ? __cfi_mutex_lock+0x10/0x10 [ 82.931783][ T3038] ? __fdget_pos+0x2cd/0x380 [ 82.936701][ T3038] ? ksys_read+0x71/0x250 [ 82.941009][ T3038] ksys_read+0x149/0x250 [ 82.945229][ T3038] ? __cfi_ksys_read+0x10/0x10 [ 82.950065][ T3038] ? __kasan_check_write+0x14/0x20 [ 82.955248][ T3038] ? fpregs_restore_userregs+0x128/0x260 [ 82.961049][ T3038] __x64_sys_read+0x7b/0x90 [ 82.965627][ T3038] x64_sys_call+0x2f/0x9a0 [ 82.970295][ T3038] do_syscall_64+0x4c/0xa0 [ 82.974771][ T3038] ? clear_bhb_loop+0x30/0x80 [ 82.979612][ T3038] ? clear_bhb_loop+0x30/0x80 [ 82.984723][ T3038] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 82.990788][ T3038] RIP: 0033:0x7f26dbb5d04e [ 82.995198][ T3038] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 83.015578][ T3038] RSP: 002b:00007f26da5f6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 83.024084][ T3038] RAX: ffffffffffffffda RBX: 00007f26da5f76c0 RCX: 00007f26dbb5d04e [ 83.032742][ T3038] RDX: 000000000000000f RSI: 00007f26da5f70a0 RDI: 0000000000000006 [ 83.040806][ T3038] RBP: 00007f26da5f7090 R08: 0000000000000000 R09: 0000000000000000 [ 83.048946][ T3038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.057006][ T3038] R13: 00007f26dbe16038 R14: 00007f26dbe15fa0 R15: 00007fffdb4c2898 [ 83.065071][ T3038] [ 83.310643][ T3053] device wg2 entered promiscuous mode [ 83.805464][ T3088] FAULT_INJECTION: forcing a failure. [ 83.805464][ T3088] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 83.893372][ T3088] CPU: 0 PID: 3088 Comm: syz.4.1085 Not tainted syzkaller #0 [ 83.901045][ T3088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 83.911197][ T3088] Call Trace: [ 83.914514][ T3088] [ 83.917554][ T3088] __dump_stack+0x21/0x24 [ 83.921972][ T3088] dump_stack_lvl+0x110/0x170 [ 83.926655][ T3088] ? __cfi_dump_stack_lvl+0x8/0x8 [ 83.931698][ T3088] dump_stack+0x15/0x24 [ 83.935864][ T3088] should_fail_ex+0x3d4/0x520 [ 83.940554][ T3088] should_fail+0xb/0x10 [ 83.944726][ T3088] should_fail_usercopy+0x1a/0x20 [ 83.949755][ T3088] _copy_to_user+0x1e/0x90 [ 83.954191][ T3088] simple_read_from_buffer+0xe9/0x160 [ 83.959776][ T3088] proc_fail_nth_read+0x1a6/0x220 [ 83.964977][ T3088] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 83.971076][ T3088] ? security_file_permission+0x94/0xb0 [ 83.977092][ T3088] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 83.982863][ T3088] vfs_read+0x27a/0x910 [ 83.987296][ T3088] ? __cfi_vfs_read+0x10/0x10 [ 83.992001][ T3088] ? __kasan_check_write+0x14/0x20 [ 83.997166][ T3088] ? mutex_lock+0x93/0x1b0 [ 84.002615][ T3088] ? __cfi_mutex_lock+0x10/0x10 [ 84.007678][ T3088] ? __fdget_pos+0x2cd/0x380 [ 84.013069][ T3088] ? ksys_read+0x71/0x250 [ 84.017614][ T3088] ksys_read+0x149/0x250 [ 84.022042][ T3088] ? __cfi_ksys_read+0x10/0x10 [ 84.026900][ T3088] ? do_user_addr_fault+0x9ac/0x1050 [ 84.032202][ T3088] ? debug_smp_processor_id+0x17/0x20 [ 84.037599][ T3088] __x64_sys_read+0x7b/0x90 [ 84.042284][ T3088] x64_sys_call+0x2f/0x9a0 [ 84.046899][ T3088] do_syscall_64+0x4c/0xa0 [ 84.051610][ T3088] ? clear_bhb_loop+0x30/0x80 [ 84.056501][ T3088] ? clear_bhb_loop+0x30/0x80 [ 84.061380][ T3088] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 84.067648][ T3088] RIP: 0033:0x7feb09b5d04e [ 84.072261][ T3088] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 84.093507][ T3088] RSP: 002b:00007feb0aa81fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 84.103346][ T3088] RAX: ffffffffffffffda RBX: 00007feb0aa826c0 RCX: 00007feb09b5d04e [ 84.111595][ T3088] RDX: 000000000000000f RSI: 00007feb0aa820a0 RDI: 0000000000000003 [ 84.120184][ T3088] RBP: 00007feb0aa82090 R08: 0000000000000000 R09: 0000000000000000 [ 84.128942][ T3088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 84.137633][ T3088] R13: 00007feb09e16038 R14: 00007feb09e15fa0 R15: 00007fffabdf5278 [ 84.146227][ T3088] [ 84.175685][ T3090] FAULT_INJECTION: forcing a failure. [ 84.175685][ T3090] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.234998][ T3090] CPU: 0 PID: 3090 Comm: syz.1.1087 Not tainted syzkaller #0 [ 84.242583][ T3090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 84.252819][ T3090] Call Trace: [ 84.256197][ T3090] [ 84.259217][ T3090] __dump_stack+0x21/0x24 [ 84.263561][ T3090] dump_stack_lvl+0x110/0x170 [ 84.268392][ T3090] ? __cfi_dump_stack_lvl+0x8/0x8 [ 84.273609][ T3090] dump_stack+0x15/0x24 [ 84.278134][ T3090] should_fail_ex+0x3d4/0x520 [ 84.283086][ T3090] should_fail+0xb/0x10 [ 84.287352][ T3090] should_fail_usercopy+0x1a/0x20 [ 84.293156][ T3090] _copy_to_user+0x1e/0x90 [ 84.297766][ T3090] simple_read_from_buffer+0xe9/0x160 [ 84.303153][ T3090] proc_fail_nth_read+0x1a6/0x220 [ 84.308363][ T3090] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 84.314183][ T3090] ? security_file_permission+0x94/0xb0 [ 84.319750][ T3090] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 84.325569][ T3090] vfs_read+0x27a/0x910 [ 84.329831][ T3090] ? __cfi_vfs_read+0x10/0x10 [ 84.335049][ T3090] ? __kasan_check_write+0x14/0x20 [ 84.340258][ T3090] ? mutex_lock+0x93/0x1b0 [ 84.344780][ T3090] ? __cfi_mutex_lock+0x10/0x10 [ 84.350000][ T3090] ? __fdget_pos+0x2cd/0x380 [ 84.354774][ T3090] ? ksys_read+0x71/0x250 [ 84.359135][ T3090] ksys_read+0x149/0x250 [ 84.363510][ T3090] ? __cfi_ksys_read+0x10/0x10 [ 84.368484][ T3090] ? fpregs_restore_userregs+0x128/0x260 [ 84.374311][ T3090] __x64_sys_read+0x7b/0x90 [ 84.378823][ T3090] x64_sys_call+0x2f/0x9a0 [ 84.383365][ T3090] do_syscall_64+0x4c/0xa0 [ 84.388078][ T3090] ? clear_bhb_loop+0x30/0x80 [ 84.392793][ T3090] ? clear_bhb_loop+0x30/0x80 [ 84.397656][ T3090] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 84.403732][ T3090] RIP: 0033:0x7f0523d5d04e [ 84.408237][ T3090] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 84.427936][ T3090] RSP: 002b:00007f0524cebfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 84.436803][ T3090] RAX: ffffffffffffffda RBX: 00007f0524cec6c0 RCX: 00007f0523d5d04e [ 84.444973][ T3090] RDX: 000000000000000f RSI: 00007f0524cec0a0 RDI: 0000000000000005 [ 84.453468][ T3090] RBP: 00007f0524cec090 R08: 0000000000000000 R09: 0000000000000000 [ 84.461883][ T3090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 84.469854][ T3090] R13: 00007f0524016038 R14: 00007f0524015fa0 R15: 00007ffd9e066828 [ 84.477826][ T3090] [ 88.385276][ T3257] device wg2 left promiscuous mode [ 89.403573][ T3298] device syzkaller0 entered promiscuous mode [ 89.520162][ T3296] device wg2 left promiscuous mode [ 89.883118][ T3318] FAULT_INJECTION: forcing a failure. [ 89.883118][ T3318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.964559][ T3318] CPU: 1 PID: 3318 Comm: syz.2.1165 Not tainted syzkaller #0 [ 89.972486][ T3318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 89.983199][ T3318] Call Trace: [ 89.986567][ T3318] [ 89.989514][ T3318] __dump_stack+0x21/0x24 [ 89.993951][ T3318] dump_stack_lvl+0x110/0x170 [ 89.998743][ T3318] ? __cfi_dump_stack_lvl+0x8/0x8 [ 90.003787][ T3318] dump_stack+0x15/0x24 [ 90.008051][ T3318] should_fail_ex+0x3d4/0x520 [ 90.013011][ T3318] should_fail+0xb/0x10 [ 90.017348][ T3318] should_fail_usercopy+0x1a/0x20 [ 90.022818][ T3318] _copy_to_user+0x1e/0x90 [ 90.027635][ T3318] bpf_test_finish+0x497/0x6c0 [ 90.032664][ T3318] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 90.038828][ T3318] ? convert_skb_to___skb+0x430/0x430 [ 90.044430][ T3318] ? __kasan_check_write+0x14/0x20 [ 90.049899][ T3318] ? _copy_from_user+0x8f/0xc0 [ 90.054753][ T3318] bpf_prog_test_run_xdp+0x80a/0xf10 [ 90.060306][ T3318] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 90.067411][ T3318] ? __kasan_check_write+0x14/0x20 [ 90.072804][ T3318] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 90.078722][ T3318] bpf_prog_test_run+0x3e3/0x640 [ 90.084392][ T3318] ? bpf_prog_query+0x270/0x270 [ 90.089710][ T3318] ? selinux_bpf+0xce/0xf0 [ 90.094666][ T3318] ? security_bpf+0x93/0xb0 [ 90.099279][ T3318] __sys_bpf+0x5ee/0x850 [ 90.104151][ T3318] ? bpf_link_show_fdinfo+0x330/0x330 [ 90.110249][ T3318] ? debug_smp_processor_id+0x17/0x20 [ 90.116184][ T3318] ? perf_trace_sys_enter+0x30/0x150 [ 90.121652][ T3318] __x64_sys_bpf+0x7c/0x90 [ 90.126780][ T3318] x64_sys_call+0x488/0x9a0 [ 90.131632][ T3318] do_syscall_64+0x4c/0xa0 [ 90.136512][ T3318] ? clear_bhb_loop+0x30/0x80 [ 90.141393][ T3318] ? clear_bhb_loop+0x30/0x80 [ 90.146264][ T3318] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 90.152429][ T3318] RIP: 0033:0x7fd62299c819 [ 90.156863][ T3318] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 90.176664][ T3318] RSP: 002b:00007fd62394d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 90.185259][ T3318] RAX: ffffffffffffffda RBX: 00007fd622c15fa0 RCX: 00007fd62299c819 [ 90.193312][ T3318] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 90.201536][ T3318] RBP: 00007fd62394d090 R08: 0000000000000000 R09: 0000000000000000 [ 90.209998][ T3318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 90.218039][ T3318] R13: 00007fd622c16038 R14: 00007fd622c15fa0 R15: 00007ffec415ad78 [ 90.226178][ T3318] [ 90.660014][ T3344] syz.3.1172[3344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.660083][ T3344] syz.3.1172[3344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.691731][ T3343] FAULT_INJECTION: forcing a failure. [ 90.691731][ T3343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 90.757538][ T3343] CPU: 1 PID: 3343 Comm: syz.1.1175 Not tainted syzkaller #0 [ 90.765745][ T3343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 90.775936][ T3343] Call Trace: [ 90.779356][ T3343] [ 90.782472][ T3343] __dump_stack+0x21/0x24 [ 90.786993][ T3343] dump_stack_lvl+0x110/0x170 [ 90.791760][ T3343] ? __cfi_dump_stack_lvl+0x8/0x8 [ 90.796952][ T3343] ? format_decode+0x1bb/0x1520 [ 90.801894][ T3343] dump_stack+0x15/0x24 [ 90.806144][ T3343] should_fail_ex+0x3d4/0x520 [ 90.811347][ T3343] should_fail+0xb/0x10 [ 90.815491][ T3343] should_fail_usercopy+0x1a/0x20 [ 90.820499][ T3343] _copy_from_user+0x1e/0xc0 [ 90.825167][ T3343] kstrtouint_from_user+0xda/0x170 [ 90.830462][ T3343] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 90.836623][ T3343] ? __kasan_check_read+0x11/0x20 [ 90.841860][ T3343] ? _copy_to_user+0x72/0x90 [ 90.846630][ T3343] ? simple_read_from_buffer+0x10f/0x160 [ 90.852856][ T3343] proc_fail_nth_write+0x8b/0x200 [ 90.858041][ T3343] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 90.863739][ T3343] ? security_file_permission+0x8a/0xb0 [ 90.869441][ T3343] ? security_file_permission+0x94/0xb0 [ 90.875579][ T3343] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 90.881735][ T3343] vfs_write+0x40e/0xce0 [ 90.886046][ T3343] ? __kasan_check_read+0x11/0x20 [ 90.891055][ T3343] ? __cfi_vfs_write+0x10/0x10 [ 90.895898][ T3343] ? __kasan_check_write+0x14/0x20 [ 90.901164][ T3343] ? mutex_lock+0x93/0x1b0 [ 90.905865][ T3343] ? __cfi_mutex_lock+0x10/0x10 [ 90.910893][ T3343] ? __fdget_pos+0x2cd/0x380 [ 90.915479][ T3343] ? ksys_write+0x71/0x250 [ 90.919978][ T3343] ksys_write+0x149/0x250 [ 90.924307][ T3343] ? __cfi_ksys_write+0x10/0x10 [ 90.929394][ T3343] ? debug_smp_processor_id+0x17/0x20 [ 90.934929][ T3343] ? perf_trace_sys_enter+0x30/0x150 [ 90.940295][ T3343] __x64_sys_write+0x7b/0x90 [ 90.945067][ T3343] x64_sys_call+0x27b/0x9a0 [ 90.949557][ T3343] do_syscall_64+0x4c/0xa0 [ 90.954065][ T3343] ? clear_bhb_loop+0x30/0x80 [ 90.958810][ T3343] ? clear_bhb_loop+0x30/0x80 [ 90.963574][ T3343] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 90.969645][ T3343] RIP: 0033:0x7f0523d5d04e [ 90.974145][ T3343] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 90.993915][ T3343] RSP: 002b:00007f0524ccafe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 91.002464][ T3343] RAX: ffffffffffffffda RBX: 00007f0524ccb6c0 RCX: 00007f0523d5d04e [ 91.010594][ T3343] RDX: 0000000000000001 RSI: 00007f0524ccb0a0 RDI: 000000000000000c [ 91.018643][ T3343] RBP: 00007f0524ccb090 R08: 0000000000000000 R09: 0000000000000000 [ 91.026921][ T3343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 91.035239][ T3343] R13: 00007f0524016128 R14: 00007f0524016090 R15: 00007ffd9e066828 [ 91.043382][ T3343] [ 92.185425][ T3381] device sit0 entered promiscuous mode [ 93.570382][ T43] device bridge_slave_1 left promiscuous mode [ 93.586782][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.618492][ T43] device bridge_slave_0 left promiscuous mode [ 93.658868][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.913519][ T3420] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.927401][ T3420] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.934939][ T3420] device bridge_slave_0 entered promiscuous mode [ 93.957794][ T3420] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.964945][ T3420] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.993306][ T3420] device bridge_slave_1 entered promiscuous mode [ 94.102930][ T28] audit: type=1400 audit(1774863571.576:138): avc: denied { create } for pid=3420 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 94.142496][ T3420] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.149592][ T3420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.167418][ T28] audit: type=1400 audit(1774863571.606:139): avc: denied { write } for pid=3420 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 94.276785][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.278763][ T28] audit: type=1400 audit(1774863571.606:140): avc: denied { read } for pid=3420 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 94.316204][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.338876][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.413386][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.446928][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.474502][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.481982][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.540058][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.578010][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.585184][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.611769][ T3445] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.619156][ T3445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.680797][ T3445] device bridge0 entered promiscuous mode [ 94.699208][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 94.732751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.758591][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.777909][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.786332][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.818935][ T3420] device veth0_vlan entered promiscuous mode [ 94.830612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 94.840546][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.854759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 94.867825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.895277][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.907638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.934948][ T3420] device veth1_macvtap entered promiscuous mode [ 94.948321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 94.957146][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.977090][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 95.006337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 95.035199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 95.053886][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 95.066944][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 96.123672][ T3491] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.135955][ T3491] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.177797][ T3491] device bridge_slave_0 entered promiscuous mode [ 96.218961][ T3491] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.226288][ T3491] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.250842][ T3491] device bridge_slave_1 entered promiscuous mode [ 96.492302][ T3491] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.499528][ T3491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.507035][ T3491] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.514639][ T3491] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.863617][ T3533] device veth0_vlan left promiscuous mode [ 96.878690][ T3533] device veth0_vlan entered promiscuous mode [ 96.901176][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.909487][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.930507][ T3534] device sit0 left promiscuous mode [ 96.943672][ T3537] device sit0 entered promiscuous mode [ 97.006496][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.014586][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.058973][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.073304][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.106667][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.114115][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.147132][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.164678][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.182239][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.189842][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.205094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.224375][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.240475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.248958][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.279017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.294079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.311557][ T3491] device veth0_vlan entered promiscuous mode [ 97.337908][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.349746][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.371492][ T3491] device veth1_macvtap entered promiscuous mode [ 97.382728][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.393000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.407824][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.424069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.440866][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.468017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.483500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.496621][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.506646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.518214][ T43] device bridge_slave_1 left promiscuous mode [ 97.524811][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.533218][ T43] device bridge_slave_0 left promiscuous mode [ 97.539734][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.548578][ T43] device veth1_macvtap left promiscuous mode [ 97.555063][ T43] device veth0_vlan left promiscuous mode [ 97.824833][ T3569] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.832365][ T3569] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.840190][ T3569] device bridge_slave_0 entered promiscuous mode [ 97.847976][ T3569] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.855183][ T3569] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.863205][ T3569] device bridge_slave_1 entered promiscuous mode [ 97.915895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.923783][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.938692][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.948061][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.957124][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.964282][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.980183][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.993255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 98.004516][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.011681][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.033522][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.042296][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 98.051481][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 98.067813][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 98.081217][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 98.090673][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 98.100047][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 98.120622][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 98.129947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.138728][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.146510][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.156664][ T3569] device veth0_vlan entered promiscuous mode [ 98.173906][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 98.184445][ T3569] device veth1_macvtap entered promiscuous mode [ 98.200536][ T3587] FAULT_INJECTION: forcing a failure. [ 98.200536][ T3587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 98.204319][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 98.224434][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 98.233006][ T3587] CPU: 1 PID: 3587 Comm: syz.3.1259 Not tainted syzkaller #0 [ 98.240772][ T3587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 98.251186][ T3587] Call Trace: [ 98.254551][ T3587] [ 98.257480][ T3587] __dump_stack+0x21/0x24 [ 98.261986][ T3587] dump_stack_lvl+0x110/0x170 [ 98.266839][ T3587] ? __cfi_dump_stack_lvl+0x8/0x8 [ 98.271872][ T3587] dump_stack+0x15/0x24 [ 98.276035][ T3587] should_fail_ex+0x3d4/0x520 [ 98.280948][ T3587] should_fail+0xb/0x10 [ 98.285152][ T3587] should_fail_usercopy+0x1a/0x20 [ 98.290395][ T3587] _copy_to_user+0x1e/0x90 [ 98.295012][ T3587] bpf_test_finish+0x251/0x6c0 [ 98.300052][ T3587] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 98.306109][ T3587] ? convert_skb_to___skb+0x430/0x430 [ 98.311548][ T3587] ? __kasan_check_write+0x14/0x20 [ 98.317604][ T3587] ? _copy_from_user+0x8f/0xc0 [ 98.322368][ T3587] bpf_prog_test_run_xdp+0x80a/0xf10 [ 98.327862][ T3587] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 98.334029][ T3587] ? __kasan_check_write+0x14/0x20 [ 98.339486][ T3587] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 98.345557][ T3587] bpf_prog_test_run+0x3e3/0x640 [ 98.350500][ T3587] ? bpf_prog_query+0x270/0x270 [ 98.355697][ T3587] ? selinux_bpf+0xce/0xf0 [ 98.360560][ T3587] ? security_bpf+0x93/0xb0 [ 98.365433][ T3587] __sys_bpf+0x5ee/0x850 [ 98.369751][ T3587] ? bpf_link_show_fdinfo+0x330/0x330 [ 98.375297][ T3587] ? __cfi_ksys_write+0x10/0x10 [ 98.380221][ T3587] ? debug_smp_processor_id+0x17/0x20 [ 98.385843][ T3587] __x64_sys_bpf+0x7c/0x90 [ 98.390603][ T3587] x64_sys_call+0x488/0x9a0 [ 98.395219][ T3587] do_syscall_64+0x4c/0xa0 [ 98.399624][ T3587] ? clear_bhb_loop+0x30/0x80 [ 98.404554][ T3587] ? clear_bhb_loop+0x30/0x80 [ 98.409300][ T3587] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 98.415261][ T3587] RIP: 0033:0x7f59a419c819 [ 98.419661][ T3587] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 98.439947][ T3587] RSP: 002b:00007f59a5045028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 98.448698][ T3587] RAX: ffffffffffffffda RBX: 00007f59a4415fa0 RCX: 00007f59a419c819 [ 98.457364][ T3587] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 98.465756][ T3587] RBP: 00007f59a5045090 R08: 0000000000000000 R09: 0000000000000000 [ 98.473882][ T3587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 98.483312][ T3587] R13: 00007f59a4416038 R14: 00007f59a4415fa0 R15: 00007fff060eb918 [ 98.491539][ T3587] [ 98.504727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 98.517631][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 98.772693][ T3603] device veth0_vlan left promiscuous mode [ 98.851681][ T3603] device veth0_vlan entered promiscuous mode [ 99.017680][ T3597] device sit0 entered promiscuous mode [ 99.524301][ T3616] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.534908][ T3616] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.543156][ T3616] device bridge_slave_0 entered promiscuous mode [ 99.558445][ T43] device bridge_slave_1 left promiscuous mode [ 99.565678][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.576187][ T43] device bridge_slave_0 left promiscuous mode [ 99.582577][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.591573][ T43] device veth1_macvtap left promiscuous mode [ 99.614471][ T43] device veth0_vlan left promiscuous mode [ 99.747766][ T3616] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.774268][ T3616] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.783874][ T3616] device bridge_slave_1 entered promiscuous mode [ 99.838518][ T3676] FAULT_INJECTION: forcing a failure. [ 99.838518][ T3676] name failslab, interval 1, probability 0, space 0, times 0 [ 99.853856][ T3676] CPU: 0 PID: 3676 Comm: syz.1.1290 Not tainted syzkaller #0 [ 99.861337][ T3676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 99.871780][ T3676] Call Trace: [ 99.875144][ T3676] [ 99.878168][ T3676] __dump_stack+0x21/0x24 [ 99.882876][ T3676] dump_stack_lvl+0x110/0x170 [ 99.887755][ T3676] ? __cfi_dump_stack_lvl+0x8/0x8 [ 99.892887][ T3676] ? _parse_integer_limit+0x18a/0x1d0 [ 99.898674][ T3676] dump_stack+0x15/0x24 [ 99.903106][ T3676] should_fail_ex+0x3d4/0x520 [ 99.907983][ T3676] __should_failslab+0xac/0xf0 [ 99.912837][ T3676] ? bpf_prog_test_run_skb+0x248/0x12c0 [ 99.918391][ T3676] should_failslab+0x9/0x20 [ 99.923259][ T3676] __kmem_cache_alloc_node+0x3d/0x2c0 [ 99.928643][ T3676] ? bpf_prog_test_run_skb+0x248/0x12c0 [ 99.934298][ T3676] __kmalloc+0xa1/0x1e0 [ 99.938646][ T3676] bpf_prog_test_run_skb+0x248/0x12c0 [ 99.944202][ T3676] ? __fget_files+0x2d5/0x330 [ 99.944809][ T3616] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.948929][ T3676] ? __kasan_check_write+0x14/0x20 [ 99.948951][ T3676] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 99.948967][ T3676] bpf_prog_test_run+0x3e3/0x640 [ 99.956290][ T3616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.961707][ T3676] ? bpf_prog_query+0x270/0x270 [ 99.961738][ T3676] ? selinux_bpf+0xce/0xf0 [ 99.961753][ T3676] ? security_bpf+0x93/0xb0 [ 99.961768][ T3676] __sys_bpf+0x5ee/0x850 [ 99.961782][ T3676] ? bpf_link_show_fdinfo+0x330/0x330 [ 99.961798][ T3676] ? __cfi_ksys_write+0x10/0x10 [ 99.961813][ T3676] ? debug_smp_processor_id+0x17/0x20 [ 99.967885][ T3616] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.972772][ T3676] __x64_sys_bpf+0x7c/0x90 [ 99.980145][ T3616] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.985132][ T3676] x64_sys_call+0x488/0x9a0 [ 100.012260][ T3673] device veth0_vlan left promiscuous mode [ 100.016150][ T3676] do_syscall_64+0x4c/0xa0 [ 100.016184][ T3676] ? clear_bhb_loop+0x30/0x80 [ 100.016203][ T3676] ? clear_bhb_loop+0x30/0x80 [ 100.016221][ T3676] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 100.016239][ T3676] RIP: 0033:0x7f0523d9c819 [ 100.016254][ T3676] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 100.016268][ T3676] RSP: 002b:00007f0524cec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 100.016287][ T3676] RAX: ffffffffffffffda RBX: 00007f0524015fa0 RCX: 00007f0523d9c819 [ 100.016300][ T3676] RDX: 0000000000000050 RSI: 00002000000007c0 RDI: 000000000000000a [ 100.016312][ T3676] RBP: 00007f0524cec090 R08: 0000000000000000 R09: 0000000000000000 [ 100.016322][ T3676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.016333][ T3676] R13: 00007f0524016038 R14: 00007f0524015fa0 R15: 00007ffd9e066828 [ 100.016349][ T3676] [ 100.191858][ T3673] device veth0_vlan entered promiscuous mode [ 100.326937][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.335004][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.343272][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.358087][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.372389][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.403093][ T3679] device sit0 left promiscuous mode [ 100.421395][ T3678] device sit0 entered promiscuous mode [ 100.486271][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.501591][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.545125][ T3616] device veth0_vlan entered promiscuous mode [ 100.554689][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.581852][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.607662][ T391] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.614881][ T391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.632353][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.644539][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.654073][ T391] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.661139][ T391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.669069][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.677993][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.686333][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.694929][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.710450][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.719382][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.728406][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.736885][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.756130][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.769462][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.792449][ T3616] device veth1_macvtap entered promiscuous mode [ 100.808091][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.820433][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.837568][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.865706][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.881885][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.900350][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.917672][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 101.387917][ T2387] device bridge_slave_1 left promiscuous mode [ 101.394159][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.401715][ T2387] device bridge_slave_0 left promiscuous mode [ 101.407989][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.415948][ T2387] device veth1_macvtap left promiscuous mode [ 101.422110][ T2387] device veth0_vlan left promiscuous mode [ 101.564528][ T3742] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.573798][ T3742] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.582474][ T3742] device bridge_slave_0 entered promiscuous mode [ 101.590304][ T3742] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.597372][ T3742] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.604651][ T3742] device bridge_slave_1 entered promiscuous mode [ 101.641204][ T3742] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.648566][ T3742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.655807][ T3742] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.664087][ T3742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.684508][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.692532][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.700114][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.709615][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.717912][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.725033][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.734025][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.742280][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.749317][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.761554][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.771584][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.785165][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.796288][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.804640][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.812957][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.824898][ T3742] device veth0_vlan entered promiscuous mode [ 101.835124][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 101.844606][ T3742] device veth1_macvtap entered promiscuous mode [ 101.854127][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 101.864456][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 102.368169][ T2387] device bridge_slave_1 left promiscuous mode [ 102.374471][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.382221][ T2387] device bridge_slave_0 left promiscuous mode [ 102.388443][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.396271][ T2387] device veth1_macvtap left promiscuous mode [ 102.402542][ T2387] device veth0_vlan left promiscuous mode [ 102.586728][ T3747] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.593988][ T3747] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.601775][ T3747] device bridge_slave_0 entered promiscuous mode [ 102.609813][ T3747] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.617112][ T3747] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.624862][ T3747] device bridge_slave_1 entered promiscuous mode [ 102.662242][ T3747] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.669556][ T3747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.676863][ T3747] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.683917][ T3747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.704086][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.711904][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.719836][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.729746][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.737954][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.745575][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.759165][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.769709][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.778365][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.789082][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.798955][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.813977][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.825335][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.835154][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.844377][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.855175][ T3747] device veth0_vlan entered promiscuous mode [ 102.865876][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.874990][ T3747] device veth1_macvtap entered promiscuous mode [ 102.884254][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.894500][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 103.377988][ T2387] device bridge_slave_1 left promiscuous mode [ 103.384201][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.392024][ T2387] device bridge_slave_0 left promiscuous mode [ 103.398498][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.406652][ T2387] device veth1_macvtap left promiscuous mode [ 103.412752][ T2387] device veth0_vlan left promiscuous mode [ 103.700258][ T3752] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.707433][ T3752] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.715590][ T3752] device bridge_slave_0 entered promiscuous mode [ 103.723181][ T3752] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.730426][ T3752] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.738209][ T3752] device bridge_slave_1 entered promiscuous mode [ 103.774371][ T3752] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.781705][ T3752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.789472][ T3752] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.796855][ T3752] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.818394][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.826215][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.834485][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.843840][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.852483][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.859535][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.869789][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.878347][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.885629][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.898372][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.907698][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.922914][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 103.934213][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.942434][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.950202][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.958705][ T3752] device veth0_vlan entered promiscuous mode [ 103.970674][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 103.979831][ T3752] device veth1_macvtap entered promiscuous mode [ 103.989390][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.999306][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.337960][ T2387] device bridge_slave_1 left promiscuous mode [ 104.344127][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.351697][ T2387] device bridge_slave_0 left promiscuous mode [ 104.358397][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.366462][ T2387] device veth1_macvtap left promiscuous mode [ 104.372868][ T2387] device veth0_vlan left promiscuous mode [ 104.898635][ T3757] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.905942][ T3757] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.914300][ T3757] device bridge_slave_0 entered promiscuous mode [ 104.923457][ T3757] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.930659][ T3757] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.938299][ T3757] device bridge_slave_1 entered promiscuous mode [ 104.977088][ T3757] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.984170][ T3757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.991770][ T3757] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.999631][ T3757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.017819][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.025628][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.033488][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.046902][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.056454][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.063829][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.073993][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.083506][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.090684][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.103234][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.116599][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.130697][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.143786][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.152203][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.160790][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.170246][ T3757] device veth0_vlan entered promiscuous mode [ 105.182176][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.191889][ T3757] device veth1_macvtap entered promiscuous mode [ 105.201961][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.212855][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.269261][ T2387] device bridge_slave_1 left promiscuous mode [ 105.276000][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.284419][ T2387] device bridge_slave_0 left promiscuous mode [ 105.290755][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.298794][ T2387] device veth1_macvtap left promiscuous mode [ 105.304835][ T2387] device veth0_vlan left promiscuous mode [ 106.147961][ T2387] device bridge_slave_1 left promiscuous mode [ 106.154373][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.162283][ T2387] device bridge_slave_0 left promiscuous mode [ 106.168635][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.177812][ T2387] device veth1_macvtap left promiscuous mode [ 106.184248][ T2387] device veth0_vlan left promiscuous mode [ 106.299682][ T3762] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.307096][ T3762] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.315071][ T3762] device bridge_slave_0 entered promiscuous mode [ 106.322945][ T3762] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.330327][ T3762] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.338489][ T3762] device bridge_slave_1 entered promiscuous mode [ 106.382298][ T3762] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.389456][ T3762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.397203][ T3762] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.404496][ T3762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.423966][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.431919][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.439886][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.449793][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.458212][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.466470][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.481920][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.490443][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.497522][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.505144][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.514773][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.523426][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.538536][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 106.547438][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 106.558945][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 106.567445][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.575844][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.583593][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.592484][ T3762] device veth0_vlan entered promiscuous mode [ 106.603659][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 106.612304][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 106.621580][ T3762] device veth1_macvtap entered promiscuous mode [ 106.630882][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 106.639569][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 106.648229][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 106.658298][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 106.668131][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 107.238019][ T307] device bridge_slave_1 left promiscuous mode [ 107.245637][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.254002][ T307] device bridge_slave_0 left promiscuous mode [ 107.260456][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.268760][ T307] device veth1_macvtap left promiscuous mode [ 107.275061][ T307] device veth0_vlan left promiscuous mode [ 107.741763][ T3767] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.749076][ T3767] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.756598][ T3767] device bridge_slave_0 entered promiscuous mode [ 107.764595][ T3767] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.772388][ T3767] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.780863][ T3767] device bridge_slave_1 entered promiscuous mode [ 107.818701][ T3767] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.826052][ T3767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.833942][ T3767] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.841017][ T3767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.859534][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.867376][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.874711][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.884814][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.893166][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.900485][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.909291][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.917883][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.925078][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.937844][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.947495][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.961404][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.973179][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.981725][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.989618][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.998598][ T3767] device veth0_vlan entered promiscuous mode [ 108.008932][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 108.018570][ T3767] device veth1_macvtap entered promiscuous mode [ 108.028716][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.039264][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.667952][ T307] device bridge_slave_1 left promiscuous mode [ 108.674412][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.682088][ T307] device bridge_slave_0 left promiscuous mode [ 108.688883][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.697918][ T307] device veth1_macvtap left promiscuous mode [ 108.704389][ T307] device veth0_vlan left promiscuous mode [ 109.205591][ T3772] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.213235][ T3772] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.221281][ T3772] device bridge_slave_0 entered promiscuous mode [ 109.228455][ T3772] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.235699][ T3772] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.243400][ T3772] device bridge_slave_1 entered promiscuous mode [ 109.281631][ T3772] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.289087][ T3772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.296992][ T3772] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.304383][ T3772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.322752][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.331055][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.339092][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.348997][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.358384][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.366153][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.375442][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.384302][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.391738][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.405280][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.415050][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.430650][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.442648][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.451217][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.460057][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.468870][ T3772] device veth0_vlan entered promiscuous mode [ 109.481065][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.490304][ T3772] device veth1_macvtap entered promiscuous mode [ 109.500770][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.512257][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.057913][ T307] device bridge_slave_1 left promiscuous mode [ 110.064252][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.072206][ T307] device bridge_slave_0 left promiscuous mode [ 110.079385][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.087657][ T307] device veth1_macvtap left promiscuous mode [ 110.094729][ T307] device veth0_vlan left promiscuous mode [ 110.779225][ T3777] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.786698][ T3777] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.795164][ T3777] device bridge_slave_0 entered promiscuous mode [ 110.802820][ T3777] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.810208][ T3777] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.818113][ T3777] device bridge_slave_1 entered promiscuous mode [ 110.857491][ T3777] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.864958][ T3777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.872847][ T3777] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.880110][ T3777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.899445][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.907881][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.915641][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.925905][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.934401][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.941492][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.951501][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.960723][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.967873][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.981051][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.991006][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.004781][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.016279][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.024490][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.032641][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.041312][ T3777] device veth0_vlan entered promiscuous mode [ 111.051978][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 111.061805][ T3777] device veth1_macvtap entered promiscuous mode [ 111.071158][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.081192][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 111.637978][ T307] device bridge_slave_1 left promiscuous mode [ 111.644228][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.651709][ T307] device bridge_slave_0 left promiscuous mode [ 111.658106][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.665857][ T307] device veth1_macvtap left promiscuous mode [ 111.671922][ T307] device veth0_vlan left promiscuous mode [ 112.444190][ T3782] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.451579][ T3782] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.459277][ T3782] device bridge_slave_0 entered promiscuous mode [ 112.466217][ T3782] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.473486][ T3782] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.481015][ T3782] device bridge_slave_1 entered promiscuous mode [ 112.517874][ T3782] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.525185][ T3782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.532732][ T3782] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.539817][ T3782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.556756][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.564535][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.572073][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.581880][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.590317][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.597441][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.606492][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.615398][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.623923][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.631132][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.641773][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.649995][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.659326][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.667717][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.680823][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.689694][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.700668][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 112.708604][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.716680][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.724463][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.732757][ T3782] device veth0_vlan entered promiscuous mode [ 112.745231][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.753598][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.763413][ T3782] device veth1_macvtap entered promiscuous mode [ 112.773508][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 112.781943][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.790731][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.800582][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.809823][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.347882][ T307] device bridge_slave_1 left promiscuous mode [ 113.354193][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.362177][ T307] device bridge_slave_0 left promiscuous mode [ 113.368601][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.376624][ T307] device veth1_macvtap left promiscuous mode [ 113.382979][ T307] device veth0_vlan left promiscuous mode [ 114.267840][ T3787] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.275229][ T3787] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.282894][ T3787] device bridge_slave_0 entered promiscuous mode [ 114.290793][ T3787] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.298652][ T3787] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.306270][ T3787] device bridge_slave_1 entered promiscuous mode [ 114.341831][ T3787] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.349052][ T3787] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.356543][ T3787] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.364378][ T3787] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.382063][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.389972][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.397928][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.406944][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.415300][ T2387] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.422679][ T2387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.431425][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.439961][ T2387] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.448485][ T2387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.460404][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.469717][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.482878][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.493722][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.501955][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.509523][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.518517][ T3787] device veth0_vlan entered promiscuous mode [ 114.529223][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.539189][ T3787] device veth1_macvtap entered promiscuous mode [ 114.548422][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.558567][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.147717][ T2387] device bridge_slave_1 left promiscuous mode [ 115.153990][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.161706][ T2387] device bridge_slave_0 left promiscuous mode [ 115.168272][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.176060][ T2387] device veth1_macvtap left promiscuous mode [ 115.182322][ T2387] device veth0_vlan left promiscuous mode [ 116.139342][ T3792] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.146467][ T3792] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.154490][ T3792] device bridge_slave_0 entered promiscuous mode [ 116.161806][ T3792] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.168854][ T3792] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.176159][ T3792] device bridge_slave_1 entered promiscuous mode [ 116.211074][ T3792] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.218251][ T3792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.225764][ T3792] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.232904][ T3792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.251001][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.259063][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.266636][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.275927][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.284589][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.291902][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.300577][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.309246][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.316432][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.328342][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.337673][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.351124][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.362185][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.370953][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.378496][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.387043][ T3792] device veth0_vlan entered promiscuous mode [ 116.396947][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.406900][ T3792] device veth1_macvtap entered promiscuous mode [ 116.416295][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.426405][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.998006][ T307] device bridge_slave_1 left promiscuous mode [ 117.004255][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.011932][ T307] device bridge_slave_0 left promiscuous mode [ 117.018407][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.026443][ T307] device veth1_macvtap left promiscuous mode [ 117.032557][ T307] device veth0_vlan left promiscuous mode [ 118.092343][ T3797] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.100834][ T3797] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.108961][ T3797] device bridge_slave_0 entered promiscuous mode [ 118.116221][ T3797] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.124231][ T3797] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.131672][ T3797] device bridge_slave_1 entered promiscuous mode [ 118.166455][ T3797] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.175019][ T3797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.182935][ T3797] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.190693][ T3797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.208187][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.216469][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.224181][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.233671][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.241973][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.249214][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.258118][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.267497][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.274799][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.287778][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.297780][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.311604][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.323157][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.332001][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.340176][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.349042][ T3797] device veth0_vlan entered promiscuous mode [ 118.359193][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 118.368419][ T3797] device veth1_macvtap entered promiscuous mode [ 118.377705][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 118.388347][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 118.977810][ T307] device bridge_slave_1 left promiscuous mode [ 118.984033][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.992880][ T307] device bridge_slave_0 left promiscuous mode [ 118.999288][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.008096][ T307] device veth1_macvtap left promiscuous mode [ 119.014219][ T307] device veth0_vlan left promiscuous mode [ 120.153662][ T3802] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.161194][ T3802] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.168900][ T3802] device bridge_slave_0 entered promiscuous mode [ 120.176270][ T3802] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.183660][ T3802] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.191240][ T3802] device bridge_slave_1 entered promiscuous mode [ 120.226644][ T3802] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.234166][ T3802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.241811][ T3802] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.249602][ T3802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.267177][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.275200][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.283117][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.293133][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.301487][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.308798][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.317610][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 120.326219][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.333743][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.345593][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 120.355146][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 120.369919][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 120.381371][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.390031][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.398453][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.406768][ T3802] device veth0_vlan entered promiscuous mode [ 120.417889][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 120.427583][ T3802] device veth1_macvtap entered promiscuous mode [ 120.437062][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 120.447827][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 121.057983][ T307] device bridge_slave_1 left promiscuous mode [ 121.064191][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.071756][ T307] device bridge_slave_0 left promiscuous mode [ 121.078711][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.087433][ T307] device veth1_macvtap left promiscuous mode [ 121.094796][ T307] device veth0_vlan left promiscuous mode [ 122.298137][ T3807] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.305904][ T3807] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.314060][ T3807] device bridge_slave_0 entered promiscuous mode [ 122.321315][ T3807] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.329200][ T3807] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.336873][ T3807] device bridge_slave_1 entered promiscuous mode [ 122.373990][ T3807] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.381230][ T3807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.388937][ T3807] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.396228][ T3807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.414090][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.422035][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.430328][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.439718][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.448206][ T2387] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.455389][ T2387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.464386][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.472768][ T2387] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.482160][ T2387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.495221][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.505531][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 122.522193][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 122.536034][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.544927][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.552873][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.561015][ T3807] device veth0_vlan entered promiscuous mode [ 122.571380][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 122.582363][ T3807] device veth1_macvtap entered promiscuous mode [ 122.592369][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 122.602580][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 123.207794][ T2387] device bridge_slave_1 left promiscuous mode [ 123.214333][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.222160][ T2387] device bridge_slave_0 left promiscuous mode [ 123.228722][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.236923][ T2387] device veth1_macvtap left promiscuous mode [ 123.243301][ T2387] device veth0_vlan left promiscuous mode [ 124.580831][ T3812] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.588285][ T3812] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.597148][ T3812] device bridge_slave_0 entered promiscuous mode [ 124.604473][ T3812] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.611575][ T3812] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.619453][ T3812] device bridge_slave_1 entered promiscuous mode [ 124.657603][ T3812] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.664926][ T3812] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.672627][ T3812] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.679769][ T3812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.697544][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.705651][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.713780][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.725057][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 124.733691][ T2387] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.740984][ T2387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.751652][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 124.760259][ T2387] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.767576][ T2387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.779911][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 124.789960][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 124.803853][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 124.816458][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.824819][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.832512][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 124.841354][ T3812] device veth0_vlan entered promiscuous mode [ 124.852294][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 124.862431][ T3812] device veth1_macvtap entered promiscuous mode [ 124.872216][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 124.883288][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 125.437898][ T2387] device bridge_slave_1 left promiscuous mode [ 125.444200][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.451779][ T2387] device bridge_slave_0 left promiscuous mode [ 125.458451][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.466521][ T2387] device veth1_macvtap left promiscuous mode [ 125.472719][ T2387] device veth0_vlan left promiscuous mode [ 126.946608][ T3817] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.954295][ T3817] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.962059][ T3817] device bridge_slave_0 entered promiscuous mode [ 126.969691][ T3817] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.977505][ T3817] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.985794][ T3817] device bridge_slave_1 entered promiscuous mode [ 127.035623][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.043640][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.053580][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.063240][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.074124][ T2387] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.082660][ T2387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.091183][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.101665][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.110283][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.118666][ T2387] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.126065][ T2387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.137218][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.146989][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.161832][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 127.174653][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.183291][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.191101][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.199524][ T3817] device veth0_vlan entered promiscuous mode [ 127.210178][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 127.219874][ T3817] device veth1_macvtap entered promiscuous mode [ 127.229993][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 127.239991][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 127.808020][ T2387] device bridge_slave_1 left promiscuous mode [ 127.814320][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.822339][ T2387] device bridge_slave_0 left promiscuous mode [ 127.828797][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.836968][ T2387] device veth1_macvtap left promiscuous mode [ 127.843406][ T2387] device veth0_vlan left promiscuous mode [ 129.392639][ T3822] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.400010][ T3822] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.408193][ T3822] device bridge_slave_0 entered promiscuous mode [ 129.415395][ T3822] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.422444][ T3822] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.430275][ T3822] device bridge_slave_1 entered promiscuous mode [ 129.465103][ T3822] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.472163][ T3822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.479575][ T3822] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.486791][ T3822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.504139][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.511528][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.519135][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.526906][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.535795][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.544176][ T2387] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.551208][ T2387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.560650][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.568884][ T2387] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.576082][ T2387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.587956][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.597929][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.611512][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 129.623267][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.631422][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.639091][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.647217][ T3822] device veth0_vlan entered promiscuous mode [ 129.657199][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 129.666919][ T3822] device veth1_macvtap entered promiscuous mode [ 129.676710][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 129.686758][ T2387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=1196 state=3 status=67 (errno 9: Bad file descriptor) [ 129.759906][ T28] audit: type=1400 audit(1774863607.236:141): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[15371]" dev="pipefs" ino=15371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 129.909271][ T283] syz-executor (283) used greatest stack depth: 21472 bytes left [ 130.287808][ T2387] device bridge_slave_1 left promiscuous mode [ 130.294413][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.302021][ T2387] device bridge_slave_0 left promiscuous mode [ 130.308389][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.316508][ T2387] device veth1_macvtap left promiscuous mode [ 130.323661][ T2387] device veth0_vlan left promiscuous mode [ 130.979530][ T2387] bridge0: port 3(gretap0) entered disabled state [ 130.989530][ T2387] device gretap0 left promiscuous mode [ 130.995637][ T2387] bridge0: port 3(gretap0) entered disabled state [ 131.118326][ T2387] device bridge_slave_1 left promiscuous mode [ 131.124715][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.132496][ T2387] device bridge_slave_0 left promiscuous mode [ 131.138844][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.146868][ T2387] device bridge_slave_1 left promiscuous mode [ 131.153195][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.160787][ T2387] device bridge_slave_0 left promiscuous mode [ 131.166878][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.175240][ T2387] device bridge_slave_1 left promiscuous mode [ 131.181479][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.189052][ T2387] device bridge_slave_0 left promiscuous mode [ 131.195240][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.203373][ T2387] device bridge_slave_1 left promiscuous mode [ 131.209957][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.217635][ T2387] device bridge_slave_0 left promiscuous mode [ 131.223837][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.232515][ T2387] device veth1_macvtap left promiscuous mode [ 131.238600][ T2387] device veth0_vlan left promiscuous mode [ 131.244802][ T2387] device veth0_vlan left promiscuous mode [ 131.251603][ T2387] device veth0_vlan left promiscuous mode