last executing test programs: 34.45621498s ago: executing program 3 (id=2270): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) close(r2) write$cgroup_type(r3, &(0x7f0000000280), 0x9) 34.272294503s ago: executing program 3 (id=2275): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000d10a8c8315b5defaa01ddec61466d701d4241ace6513daedf7483d907bc279202246ce5345df6d23018c593a6dd210fb20dad4d50cb4026ab2e188ee5ec9f481022d52c957b847d41419c3cdfa65dd8b7331a0e45e3dcaf1267a8bbf271744aa54c87d28d70fc8a87180eeb6c5fe1ae06d372a50f05d"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xe80ccef02a1e9e99, 0x2, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0x84}, @call={0x85, 0x0, 0x0, 0xb3}], &(0x7f0000000400)='GPL\x00', 0x6, 0x1000, &(0x7f0000001340)=""/4096, 0x41100, 0x6e, '\x00', r7, @fallback=0xe, r8, 0x8, &(0x7f0000000700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0xc, 0x85, 0xd12b}, 0x10, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000780)=[{0x5, 0x1, 0x9, 0x8}, {0x5, 0x4, 0x4, 0x1}], 0x10, 0x6, @void, @value}, 0x94) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.high\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 33.700212751s ago: executing program 3 (id=2278): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) close(0x4) 33.472899154s ago: executing program 1 (id=2280): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000e643d53568eb35385b61e961d9b51467c10db2639900ad20d3c2aaa6105cb1ac6aa57a8bc861ff30d4d5672e1b3b02e3f25b99f0fadab4d24a63b1dac403358a4e90a94ad8c2af5083f2f9d8c0ed7e09e947d8bb4d413ed07cf7e6615f06ed888c0ec7d9bfecc6b8eda5854d98ade7456685894192d5758cf5901b", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b23000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00=', @ANYRES32=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000b82c99d117798a06f49152d01026685ef2209e195d70419b135617d49b5f6e3bbdc0ee90d3be458caee70eacb4e35acdbe1413945ffb29c0f5c8d4586f9ea979e33e2e19124a7a26c72f6cb7aab16498ca", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 33.335526176s ago: executing program 3 (id=2283): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) close(0x3) perf_event_open(0x0, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x20000992) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={0x0}, 0x18) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x3c) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000001a00000a8500000007000000c50000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfe3a) 33.334851446s ago: executing program 1 (id=2284): socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xaac, 0xffffffff, 0x2, 0x1, r4, 0x4, '\x00', r5, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0x9, @void, @value, @void, @value}, 0x50) r6 = gettid() syz_open_procfs$namespace(r6, &(0x7f0000000600)='ns/mnt\x00') (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480, 0x4, @perf_config_ext={0xfd, 0x8}, 0x0, 0x5}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x0, 0x10001}, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xf) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)}, 0x3) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r8}, 0x10) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x4, &(0x7f00000009c0)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) 33.289004606s ago: executing program 1 (id=2285): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000d10a8c8315b5defaa01ddec61466d701d4241ace6513daedf7483d907bc279202246ce5345df6d23018c593a6dd210fb20dad4d50cb4026ab2e188ee5ec9f481022d52c957b847d41419c3cdfa65dd8b7331a0e45e3dcaf1267a8bbf271744aa54c87d28d70fc8a87180eeb6c5fe1ae06d372a50f05d"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xe80ccef02a1e9e99, 0x2, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0x84}, @call={0x85, 0x0, 0x0, 0xb3}], &(0x7f0000000400)='GPL\x00', 0x6, 0x1000, &(0x7f0000001340)=""/4096, 0x41100, 0x6e, '\x00', r7, @fallback=0xe, r8, 0x8, &(0x7f0000000700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0xc, 0x85, 0xd12b}, 0x10, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000780)=[{0x5, 0x1, 0x9, 0x8}, {0x5, 0x4, 0x4, 0x1}], 0x10, 0x6, @void, @value}, 0x94) r9 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.high\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000380)=0x8, 0x12) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 33.282398477s ago: executing program 2 (id=2286): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) close(r0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) 33.147194718s ago: executing program 0 (id=2287): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000d10a8c8315b5defaa01ddec61466d701d4241ace6513daedf7483d907bc279202246ce5345df6d23018c593a6dd210fb20dad4d50cb4026ab2e188ee5ec9f481022d52c957b847d41419c3cdfa65dd8b7331a0e45e3dcaf1267a8bbf271744aa54c87d28d70fc8a87180eeb6c5fe1ae06d372a50f05d"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xe80ccef02a1e9e99, 0x2, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0x84}, @call={0x85, 0x0, 0x0, 0xb3}], &(0x7f0000000400)='GPL\x00', 0x6, 0x1000, &(0x7f0000001340)=""/4096, 0x41100, 0x6e, '\x00', r7, @fallback=0xe, r8, 0x8, &(0x7f0000000700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0xc, 0x85, 0xd12b}, 0x10, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000780)=[{0x5, 0x1, 0x9, 0x8}, {0x5, 0x4, 0x4, 0x1}], 0x10, 0x6, @void, @value}, 0x94) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.high\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 33.02212414s ago: executing program 1 (id=2288): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) close(r2) write$cgroup_type(r3, &(0x7f0000000280), 0x9) 32.957998041s ago: executing program 2 (id=2289): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x1080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x800000000000000, 0x1}, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0xffffffffffffff6d}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) close(0xffffffffffffffff) 32.806456703s ago: executing program 1 (id=2290): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1, &(0x7f0000000b80)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x118}, 0x20000004) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x68) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e0000000400e3ff0300000009000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) sendmsg$inet(r5, &(0x7f0000000980)={&(0x7f00000005c0)={0x2, 0x4e20, @broadcast}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000009c0), 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_clone(0x11000000, &(0x7f0000000180)="5ca44104bacbd4ed9a63193f03d96fcefefd4c2c0d9349613bfa55ccc1f6", 0x1e, &(0x7f00000001c0), &(0x7f0000000280), &(0x7f0000000300)="1f81eef4ee181e80fb2a2d9e44a2ea6c3bb91cc12e751c9611191b10c80c12a93708fa0f91eafae5c809118816a8710c24cd41ce5529bb42ae7cb04953f3b41bc1da72c434430e0e8b310ccad3ce8da4e43133be39d1073241d151933e51fbf91d95b4e439d6122c5d681eec57cae963327499a16b3fe1") syz_open_procfs$namespace(r7, &(0x7f0000000380)='ns/user\x00') bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0)={@map=r3, r1, 0xd, 0x10, 0x0, @void, @value=r4}, 0x20) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_vmscan_write_folio\x00', r4, 0x0, 0x9}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) 32.804367574s ago: executing program 2 (id=2299): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) close(r0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) 32.3237054s ago: executing program 1 (id=2291): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53a1}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="19000000040000000800000008", @ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x6, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)=0x2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r5, 0xffffffffffffffff}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r5, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000340)='tlb_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x1c, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) r10 = perf_event_open(&(0x7f0000000880)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRESHEX=r8, @ANYRES64=r10, @ANYRES64=0x0, @ANYRESDEC=r0, @ANYRES32, @ANYRES32=r9], 0x50) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x3ff, 0x8, 0x4, 0x804, r6, 0x3, '\x00', r9, r5, 0x0, 0x3, 0x2, 0xc, @void, @value, @void, @value}, 0x50) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x2, 0x6, 0x7fff, 0x10, r11, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r12}, &(0x7f0000000040), &(0x7f0000000140), 0x4000}, 0x20) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00ebca0000812fee1f97bd7273f65dcf5b0000000000000000000005000000000000000be2e173f40e323665699adacffc7701b86477483fec44b273c3ba2246968c468f01a4167ac6acc3ddbd2ba40df8d604bb5d79f2b3720b61604f7b7bfda60945a30b607a7be45b2943534701e2", @ANYRES32=r11, @ANYBLOB="c50f00"/20, @ANYRES32=r9, @ANYRES32, @ANYBLOB="05000000010000000400"/28], 0x50) 32.32346299s ago: executing program 2 (id=2292): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) close(0x4) 32.32274727s ago: executing program 3 (id=2293): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000d10a8c8315b5defaa01ddec61466d701d4241ace6513daedf7483d907bc279202246ce5345df6d23018c593a6dd210fb20dad4d50cb4026ab2e188ee5ec9f481022d52c957b847d41419c3cdfa65dd8b7331a0e45e3dcaf1267a8bbf271744aa54c87d28d70fc8a87180eeb6c5fe1ae06d372a50f05d"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xe80ccef02a1e9e99, 0x2, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0x84}, @call={0x85, 0x0, 0x0, 0xb3}], &(0x7f0000000400)='GPL\x00', 0x6, 0x1000, &(0x7f0000001340)=""/4096, 0x41100, 0x6e, '\x00', r7, @fallback=0xe, r8, 0x8, &(0x7f0000000700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0xc, 0x85, 0xd12b}, 0x10, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000780)=[{0x5, 0x1, 0x9, 0x8}, {0x5, 0x4, 0x4, 0x1}], 0x10, 0x6, @void, @value}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)=0x8, 0x12) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 32.31708097s ago: executing program 0 (id=2301): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) close(r0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) 32.162322913s ago: executing program 2 (id=2294): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000e643d53568eb35385b61e961d9b51467c10db2639900ad20d3c2aaa6105cb1ac6aa57a8bc861ff30d4d5672e1b3b02e3f25b99f0fadab4d24a63b1dac403358a4e90a94ad8c2af5083f2f9d8c0ed7e09e947d8bb4d413ed07cf7e6615f06ed888c0ec7d9bfecc6b8eda5854d98ade7456685894192d5758cf5901b", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b23000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00=', @ANYRES32=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000b82c99d117798a06f49152d01026685ef2209e195d70419b135617d49b5f6e3bbdc0ee90d3be458caee70eacb4e35acdbe1413945ffb29c0f5c8d4586f9ea979e33e2e19124a7a26c72f6cb7aab16498ca", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 32.044633534s ago: executing program 2 (id=2295): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000d10a8c8315b5defaa01ddec61466d701d4241ace6513daedf7483d907bc279202246ce5345df6d23018c593a6dd210fb20dad4d50cb4026ab2e188ee5ec9f481022d52c957b847d41419c3cdfa65dd8b7331a0e45e3dcaf1267a8bbf271744aa54c87d28d70fc8a87180eeb6c5fe1ae06d372a50f05d"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xe80ccef02a1e9e99, 0x2, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0x84}, @call={0x85, 0x0, 0x0, 0xb3}], &(0x7f0000000400)='GPL\x00', 0x6, 0x1000, &(0x7f0000001340)=""/4096, 0x41100, 0x6e, '\x00', r7, @fallback=0xe, r8, 0x8, &(0x7f0000000700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0xc, 0x85, 0xd12b}, 0x10, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000780)=[{0x5, 0x1, 0x9, 0x8}, {0x5, 0x4, 0x4, 0x1}], 0x10, 0x6, @void, @value}, 0x94) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.high\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 32.036761454s ago: executing program 0 (id=2306): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) close(0x4) 31.968331255s ago: executing program 0 (id=2296): bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0x1, 0x58, &(0x7f0000000300)}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="16000000000000000700"/20, @ANYRES32=0x1, @ANYBLOB='\r\x00\x00F\\ Z\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000030000000400"/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000840900000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x8000}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r8, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYRESDEC=r2, @ANYRES16=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000005c0)="6b20574f8d0d516a9a11560544", &(0x7f0000000280), 0x9, r9}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000580)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) mkdir(0x0, 0x0) 31.967193465s ago: executing program 3 (id=2297): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0xac, 0xd0, 0x8, 0x0, 0x9, 0x4002, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x2}, 0x8400, 0x101, 0x8, 0x6, 0x1000000, 0x8, 0x1ff, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500000004000000040000000400000000000000", @ANYRES32, @ANYBLOB="00007f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (rerun: 32) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000005000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x3ba, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) (async, rerun: 64) socketpair(0x1, 0x1, 0x8000, &(0x7f0000000000)) (async, rerun: 64) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@bloom_filter={0x1e, 0x360, 0x1, 0x7f, 0x10000, r0, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x1, 0xd, @void, @value, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@o_path={0x0, 0x0, 0x4018}, 0x18) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20460, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100020, 0x1, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010701000000000000004741284cb71b", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) 31.864105796s ago: executing program 0 (id=2298): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000d10a8c8315b5defaa01ddec61466d701d4241ace6513daedf7483d907bc279202246ce5345df6d23018c593a6dd210fb20dad4d50cb4026ab2e188ee5ec9f481022d52c957b847d41419c3cdfa65dd8b7331a0e45e3dcaf1267a8bbf271744aa54c87d28d70fc8a87180eeb6c5fe1ae06d372a50f05d"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xe80ccef02a1e9e99, 0x2, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0x84}, @call={0x85, 0x0, 0x0, 0xb3}], &(0x7f0000000400)='GPL\x00', 0x6, 0x1000, &(0x7f0000001340)=""/4096, 0x41100, 0x6e, '\x00', r7, @fallback=0xe, r8, 0x8, &(0x7f0000000700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0xc, 0x85, 0xd12b}, 0x10, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000780)=[{0x5, 0x1, 0x9, 0x8}, {0x5, 0x4, 0x4, 0x1}], 0x10, 0x6, @void, @value}, 0x94) r9 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.high\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000380)=0x8, 0x12) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 31.677914589s ago: executing program 0 (id=2300): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) close(r2) write$cgroup_type(r3, &(0x7f0000000280), 0x9) 11.431184001s ago: executing program 4 (id=2262): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x82004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x38e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x1080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x800000000000000, 0x1}, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0xffffffffffffff6d}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) close(0xffffffffffffffff) 9.290663581s ago: executing program 4 (id=2262): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x82004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x38e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x1080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x800000000000000, 0x1}, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0xffffffffffffff6d}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) close(0xffffffffffffffff) 7.111163212s ago: executing program 4 (id=2262): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x82004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x38e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x1080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x800000000000000, 0x1}, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0xffffffffffffff6d}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) close(0xffffffffffffffff) 4.831080863s ago: executing program 4 (id=2262): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x82004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x38e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x1080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x800000000000000, 0x1}, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0xffffffffffffff6d}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) close(0xffffffffffffffff) 2.470628946s ago: executing program 4 (id=2262): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x82004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x38e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x1080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x800000000000000, 0x1}, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0xffffffffffffff6d}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) close(0xffffffffffffffff) 0s ago: executing program 4 (id=2262): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x82004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x38e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x1080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x800000000000000, 0x1}, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0xffffffffffffff6d}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) close(0xffffffffffffffff) kernel console output (not intermixed with test programs): mes ready [ 90.352580][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.735599][ T2885] device syz_tun entered promiscuous mode [ 90.962853][ T2895] device sit0 left promiscuous mode [ 91.343810][ T2912] syz.1.765[2912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.343886][ T2912] syz.1.765[2912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.922915][ T2913] syz.0.766 (2913) used greatest stack depth: 21488 bytes left [ 93.420381][ T2989] €Â0: renamed from pim6reg1 [ 95.301120][ T3027] device sit0 entered promiscuous mode [ 95.547567][ T3049] syz.1.803[3049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.547670][ T3049] syz.1.803[3049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.844206][ T3054] device wg2 entered promiscuous mode [ 96.983140][ T3084] device veth1_macvtap entered promiscuous mode [ 97.001460][ T3084] device macsec0 entered promiscuous mode [ 97.077041][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.398410][ T3107] syz.4.817[3107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.398495][ T3107] syz.4.817[3107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.913904][ T3151] device sit0 left promiscuous mode [ 99.002237][ T3155] device sit0 entered promiscuous mode [ 100.216103][ T3184] device syzkaller0 entered promiscuous mode [ 101.578983][ T3249] device pim6reg1 entered promiscuous mode [ 101.811189][ T3262] bond_slave_1: mtu less than device minimum [ 102.159833][ T3286] device syzkaller0 entered promiscuous mode [ 102.182115][ T3286] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 102.262567][ T3286] device syzkaller0 left promiscuous mode [ 102.860339][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.867615][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.982763][ T3317] device bridge_slave_1 left promiscuous mode [ 102.991189][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.007600][ T3317] device bridge_slave_0 left promiscuous mode [ 103.015407][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.689632][ T3334] device syzkaller0 entered promiscuous mode [ 103.896619][ T3338] device ip6gretap0 entered promiscuous mode [ 104.655271][ T3375] device pim6reg1 entered promiscuous mode [ 106.197640][ T3418] device pim6reg1 entered promiscuous mode [ 106.830544][ T3444] device sit0 left promiscuous mode [ 106.982740][ T3444] device sit0 entered promiscuous mode [ 107.224254][ T3470] device veth0_vlan left promiscuous mode [ 107.230334][ T3470] device veth0_vlan entered promiscuous mode [ 107.249183][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.257884][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.271899][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.361845][ T3546] bond_slave_1: mtu less than device minimum [ 110.709125][ T3602] device syzkaller0 entered promiscuous mode [ 110.973556][ T3616] device macsec0 entered promiscuous mode [ 112.001810][ T3666] Â: renamed from pim6reg1 [ 112.830349][ T3692] bond_slave_1: mtu less than device minimum [ 113.687376][ T3725] device wg2 left promiscuous mode [ 116.391413][ T3843] device sit0 left promiscuous mode [ 116.497665][ T3843] device sit0 entered promiscuous mode [ 116.570823][ T3832] bond_slave_1: mtu less than device minimum [ 117.145295][ T3860] device syzkaller0 entered promiscuous mode [ 117.341135][ T3884] bond_slave_1: mtu less than device minimum [ 117.624390][ T3895] device wg2 left promiscuous mode [ 117.838462][ T3895] device wg2 entered promiscuous mode [ 118.833449][ T3952] device wg2 left promiscuous mode [ 118.963404][ T3952] device wg2 entered promiscuous mode [ 119.101038][ T3966] device syzkaller0 entered promiscuous mode [ 119.380370][ T4001] syz.2.1093[4001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.380484][ T4001] syz.2.1093[4001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.413488][ T3996] device wg2 left promiscuous mode [ 120.707849][ T4035] ref_ctr_offset mismatch. inode: 0x4c6 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 120.887279][ T4046] device pim6reg1 entered promiscuous mode [ 120.966890][ T4048] device wg2 left promiscuous mode [ 121.616742][ T4073] device sit0 left promiscuous mode [ 121.631761][ T4073] device sit0 entered promiscuous mode [ 121.890207][ T30] audit: type=1400 audit(1747477231.774:154): avc: denied { create } for pid=4081 comm="syz.2.1120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 122.156879][ T4087] device wg2 left promiscuous mode [ 122.217569][ T4088] device sit0 left promiscuous mode [ 122.482195][ T4090] device sit0 entered promiscuous mode [ 123.318917][ T4136] device pim6reg1 entered promiscuous mode [ 123.645117][ T4154] device wg2 entered promiscuous mode [ 123.786792][ T4166] device sit0 left promiscuous mode [ 123.870208][ T4166] device sit0 entered promiscuous mode [ 124.676349][ T4195] device veth0_vlan left promiscuous mode [ 124.697440][ T4195] device veth0_vlan entered promiscuous mode [ 125.220755][ T4233] device veth0_vlan left promiscuous mode [ 125.272329][ T4233] device veth0_vlan entered promiscuous mode [ 125.303739][ T4240] ref_ctr_offset mismatch. inode: 0x4bd offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 125.335317][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.344993][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): ŞŞŞŞŞŞ: link becomes ready [ 125.356074][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): ˙˙˙˙˙˙: link becomes ready [ 126.230184][ T4274] device veth0_vlan left promiscuous mode [ 126.278920][ T4274] device veth0_vlan entered promiscuous mode [ 126.289077][ T4290] syz.3.1184[4290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.289175][ T4290] syz.3.1184[4290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.357082][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.396420][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.420081][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.683028][ T4358] device syzkaller0 entered promiscuous mode [ 127.707574][ T4356] device wg2 left promiscuous mode [ 128.009035][ T4360] device pim6reg1 entered promiscuous mode [ 128.698700][ T4399] device wg2 entered promiscuous mode [ 129.443435][ T4433] device syzkaller0 entered promiscuous mode [ 129.828847][ T4441] device wg2 entered promiscuous mode [ 130.318123][ T4497] device syzkaller0 entered promiscuous mode [ 130.685045][ T4520] device wg2 left promiscuous mode [ 130.905714][ T4520] device wg2 entered promiscuous mode [ 130.972123][ T4546] bond_slave_1: mtu less than device minimum [ 131.476623][ T4550] device syzkaller0 entered promiscuous mode [ 131.946941][ T4561] device syzkaller0 entered promiscuous mode [ 133.627498][ T4595] device wg2 left promiscuous mode [ 133.904143][ T4595] device wg2 entered promiscuous mode [ 134.228865][ T4601] bridge0: port 3(veth0) entered blocking state [ 134.240459][ T4601] bridge0: port 3(veth0) entered disabled state [ 134.261167][ T4601] device veth0 entered promiscuous mode [ 135.257027][ T4625] syz.1.1287[4625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.257256][ T4625] syz.1.1287[4625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.496867][ T4636] device wg2 entered promiscuous mode [ 138.764805][ T4687] ŞŞŞŞŞŞ: renamed from vlan0 [ 138.940491][ T4685] device syzkaller0 entered promiscuous mode [ 139.453254][ T4714] device wg2 left promiscuous mode [ 139.526783][ T4715] device wg2 entered promiscuous mode [ 140.212455][ T4753] device wg2 left promiscuous mode [ 140.279511][ T4755] device wg2 entered promiscuous mode [ 140.779288][ T4775] device syzkaller0 entered promiscuous mode [ 140.785987][ T4775] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 140.937821][ T4774] device syzkaller0 entered promiscuous mode [ 141.501720][ T4799] device veth1_macvtap left promiscuous mode [ 141.535398][ T4799] device macsec0 left promiscuous mode [ 141.812744][ T4807] device sit0 left promiscuous mode [ 142.389302][ T4813] syz.2.1343[4813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.389378][ T4813] syz.2.1343[4813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.124127][ T4836] device wg2 left promiscuous mode [ 143.218786][ T4836] device wg2 entered promiscuous mode [ 143.703048][ T4862] device sit0 left promiscuous mode [ 144.167243][ T4882] cgroup: fork rejected by pids controller in /syz3 [ 144.313054][ T4877] device wg2 entered promiscuous mode [ 145.287089][ T316] GPL: port 1(erspan0) entered disabled state [ 145.367723][ T316] device erspan0 left promiscuous mode [ 145.433137][ T316] GPL: port 1(erspan0) entered disabled state [ 145.489479][ T4923] device wg2 left promiscuous mode [ 145.517429][ T4929] device wg2 entered promiscuous mode [ 145.718655][ T4938] bond_slave_1: mtu less than device minimum [ 145.835536][ T316] device veth0_to_batadv left promiscuous mode [ 145.841805][ T316] bridge0: port 3(veth0_to_batadv) entered disabled state [ 145.853749][ T316] device bridge_slave_1 left promiscuous mode [ 145.860066][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.868243][ T316] device bridge_slave_0 left promiscuous mode [ 145.874756][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.883914][ T316] device veth1_macvtap left promiscuous mode [ 145.890055][ T316] device veth0_vlan left promiscuous mode [ 146.075553][ T4919] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.083884][ T4919] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.091476][ T4919] device bridge_slave_0 entered promiscuous mode [ 146.099561][ T4919] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.106683][ T4919] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.114602][ T4919] device bridge_slave_1 entered promiscuous mode [ 146.269063][ T30] audit: type=1400 audit(1747477256.154:155): avc: denied { create } for pid=4919 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 146.304372][ T4919] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.311477][ T4919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.318827][ T4919] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.325886][ T4919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.377021][ T4970] device wg2 left promiscuous mode [ 146.405871][ T4977] device wg2 entered promiscuous mode [ 146.406160][ T30] audit: type=1400 audit(1747477256.154:156): avc: denied { write } for pid=4919 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 146.502810][ T4981] ˙˙˙˙ge0: port 1(veth1) entered blocking state [ 146.541675][ T30] audit: type=1400 audit(1747477256.154:157): avc: denied { read } for pid=4919 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 146.559416][ T4981] ˙˙˙˙ge0: port 1(veth1) entered disabled state [ 146.569290][ T4981] device veth1 entered promiscuous mode [ 146.576534][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.584712][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.592699][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.602467][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.610934][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.619641][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.626728][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.657775][ T4981] device pim6reg1 entered promiscuous mode [ 146.722716][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.745592][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.800178][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.807293][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.853816][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.904341][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.912616][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.921368][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.970044][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 146.989499][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 147.064301][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 147.086888][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.156603][ T4919] device veth0_vlan entered promiscuous mode [ 147.183912][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.272895][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.318177][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 147.402737][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 147.452333][ T4919] device veth1_macvtap entered promiscuous mode [ 147.505039][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.545629][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 147.617463][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 147.670477][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 147.702576][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 147.896682][ T5019] device wg2 left promiscuous mode [ 148.014892][ T5019] device wg2 entered promiscuous mode [ 148.098204][ T5032] device syzkaller0 entered promiscuous mode [ 148.637394][ T5065] device syzkaller0 entered promiscuous mode [ 149.324883][ T5074] device wg2 entered promiscuous mode [ 150.009784][ T5132] device wg2 left promiscuous mode [ 150.208060][ T5132] device wg2 entered promiscuous mode [ 150.450222][ T5152] syz.4.1464[5152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.450328][ T5152] syz.4.1464[5152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.188633][ T5175] device wg2 left promiscuous mode [ 151.417470][ T5175] device wg2 entered promiscuous mode [ 151.889209][ T5226] device wg2 left promiscuous mode [ 153.224852][ T5269] device wg2 left promiscuous mode [ 154.241709][ T5304] device wg2 entered promiscuous mode [ 154.417610][ T5319] device wg2 left promiscuous mode [ 155.291678][ T5372] device wg2 entered promiscuous mode [ 158.161387][ T5421] device wg2 left promiscuous mode [ 158.212652][ T5414] device veth0 left promiscuous mode [ 158.218004][ T30] audit: type=1400 audit(1747477268.104:158): avc: denied { create } for pid=5410 comm="syz.0.1554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 158.237594][ T5414] bridge0: port 3(veth0) entered disabled state [ 158.251644][ T5414] device bridge_slave_1 left promiscuous mode [ 158.274963][ T5414] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.300447][ T5414] device bridge_slave_0 left promiscuous mode [ 158.355925][ T5414] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.434357][ T5427] device sit0 left promiscuous mode [ 158.538139][ T5424] device sit0 entered promiscuous mode [ 158.562601][ T5421] device wg2 entered promiscuous mode [ 159.126228][ T5472] device wg2 left promiscuous mode [ 159.326818][ T5472] device wg2 entered promiscuous mode [ 159.890074][ T5514] device wg2 left promiscuous mode [ 160.011413][ T5514] device wg2 entered promiscuous mode [ 160.348078][ T5541] device pim6reg1 entered promiscuous mode [ 160.662555][ T5560] device wg2 entered promiscuous mode [ 161.211201][ T5608] device wg2 left promiscuous mode [ 161.552942][ T5608] device wg2 entered promiscuous mode [ 162.184196][ T5637] ˙˙˙˙˙˙: renamed from vlan1 [ 162.615369][ T5649] device wg2 left promiscuous mode [ 162.647962][ T5659] FAULT_INJECTION: forcing a failure. [ 162.647962][ T5659] name failslab, interval 1, probability 0, space 0, times 0 [ 162.730939][ T5659] CPU: 1 PID: 5659 Comm: syz.4.1650 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 162.740910][ T5659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 162.750979][ T5659] Call Trace: [ 162.754258][ T5659] [ 162.757200][ T5659] __dump_stack+0x21/0x30 [ 162.761553][ T5659] dump_stack_lvl+0xee/0x150 [ 162.766138][ T5659] ? show_regs_print_info+0x20/0x20 [ 162.771359][ T5659] ? avc_has_perm_noaudit+0x2f4/0x460 [ 162.776728][ T5659] dump_stack+0x15/0x20 [ 162.780878][ T5659] should_fail+0x3c1/0x510 [ 162.785289][ T5659] __should_failslab+0xa4/0xe0 [ 162.790047][ T5659] should_failslab+0x9/0x20 [ 162.794543][ T5659] slab_pre_alloc_hook+0x3b/0xe0 [ 162.799500][ T5659] ? __alloc_skb+0xe0/0x740 [ 162.804443][ T5659] kmem_cache_alloc+0x44/0x260 [ 162.809204][ T5659] __alloc_skb+0xe0/0x740 [ 162.813536][ T5659] alloc_skb_with_frags+0xa8/0x620 [ 162.818648][ T5659] sock_alloc_send_pskb+0x853/0x980 [ 162.823843][ T5659] ? is_bpf_text_address+0x177/0x190 [ 162.829133][ T5659] ? __kernel_text_address+0xa0/0x100 [ 162.834509][ T5659] ? sock_kzfree_s+0x60/0x60 [ 162.839101][ T5659] ? _raw_spin_lock+0x8e/0xe0 [ 162.843785][ T5659] ? _raw_spin_trylock_bh+0x130/0x130 [ 162.849160][ T5659] tun_get_user+0x4e6/0x33c0 [ 162.853742][ T5659] ? __kasan_poison_slab+0x30/0x70 [ 162.858852][ T5659] ? __kasan_check_write+0x14/0x20 [ 162.863957][ T5659] ? tun_do_read+0x1c40/0x1c40 [ 162.868714][ T5659] ? kstrtouint_from_user+0x1a0/0x200 [ 162.874080][ T5659] ? kstrtol_from_user+0x260/0x260 [ 162.879185][ T5659] ? putname+0x111/0x160 [ 162.883421][ T5659] ? avc_policy_seqno+0x1b/0x70 [ 162.888263][ T5659] ? selinux_file_permission+0x2aa/0x510 [ 162.894004][ T5659] tun_chr_write_iter+0x1eb/0x2e0 [ 162.899028][ T5659] vfs_write+0x802/0xf70 [ 162.903265][ T5659] ? file_end_write+0x1b0/0x1b0 [ 162.908107][ T5659] ? __fget_files+0x2c4/0x320 [ 162.912790][ T5659] ? __fdget_pos+0x1f7/0x380 [ 162.917484][ T5659] ? ksys_write+0x71/0x240 [ 162.921902][ T5659] ksys_write+0x140/0x240 [ 162.926228][ T5659] ? __ia32_sys_read+0x90/0x90 [ 162.930987][ T5659] ? debug_smp_processor_id+0x17/0x20 [ 162.936373][ T5659] __x64_sys_write+0x7b/0x90 [ 162.940963][ T5659] x64_sys_call+0x8ef/0x9a0 [ 162.945546][ T5659] do_syscall_64+0x4c/0xa0 [ 162.949964][ T5659] ? clear_bhb_loop+0x35/0x90 [ 162.954635][ T5659] ? clear_bhb_loop+0x35/0x90 [ 162.959302][ T5659] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 162.965203][ T5659] RIP: 0033:0x7f9ee2964969 [ 162.969616][ T5659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.989217][ T5659] RSP: 002b:00007f9ee0fcd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 162.997624][ T5659] RAX: ffffffffffffffda RBX: 00007f9ee2b8bfa0 RCX: 00007f9ee2964969 [ 163.005589][ T5659] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 163.013554][ T5659] RBP: 00007f9ee0fcd090 R08: 0000000000000000 R09: 0000000000000000 [ 163.021520][ T5659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 163.029485][ T5659] R13: 0000000000000000 R14: 00007f9ee2b8bfa0 R15: 00007ffcd0e44638 [ 163.037465][ T5659] [ 163.403845][ T5649] device wg2 entered promiscuous mode [ 163.985915][ T5696] FAULT_INJECTION: forcing a failure. [ 163.985915][ T5696] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 164.042428][ T5696] CPU: 0 PID: 5696 Comm: syz.3.1664 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 164.052472][ T5696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 164.062541][ T5696] Call Trace: [ 164.065824][ T5696] [ 164.068752][ T5696] __dump_stack+0x21/0x30 [ 164.073087][ T5696] dump_stack_lvl+0xee/0x150 [ 164.077680][ T5696] ? show_regs_print_info+0x20/0x20 [ 164.082886][ T5696] ? stack_trace_save+0x98/0xe0 [ 164.087742][ T5696] dump_stack+0x15/0x20 [ 164.091904][ T5696] should_fail+0x3c1/0x510 [ 164.096326][ T5696] should_fail_alloc_page+0x55/0x80 [ 164.101533][ T5696] prepare_alloc_pages+0x156/0x600 [ 164.106647][ T5696] ? __alloc_pages_bulk+0xab0/0xab0 [ 164.111845][ T5696] __alloc_pages+0x10a/0x440 [ 164.116433][ T5696] ? prep_new_page+0x110/0x110 [ 164.121198][ T5696] kmalloc_order+0x4c/0x160 [ 164.125694][ T5696] ? alloc_skb_with_frags+0xa8/0x620 [ 164.130975][ T5696] kmalloc_order_trace+0x18/0xb0 [ 164.135911][ T5696] __kmalloc_track_caller+0x198/0x2c0 [ 164.141280][ T5696] ? kmem_cache_alloc+0xf7/0x260 [ 164.146218][ T5696] ? alloc_skb_with_frags+0xa8/0x620 [ 164.152121][ T5696] __alloc_skb+0x21a/0x740 [ 164.156558][ T5696] alloc_skb_with_frags+0xa8/0x620 [ 164.161683][ T5696] sock_alloc_send_pskb+0x853/0x980 [ 164.166881][ T5696] ? is_bpf_text_address+0x177/0x190 [ 164.172163][ T5696] ? __kernel_text_address+0xa0/0x100 [ 164.177531][ T5696] ? sock_kzfree_s+0x60/0x60 [ 164.182117][ T5696] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 164.187919][ T5696] tun_get_user+0x4e6/0x33c0 [ 164.192506][ T5696] ? __kasan_check_write+0x14/0x20 [ 164.197613][ T5696] ? tun_do_read+0x1c40/0x1c40 [ 164.202372][ T5696] ? kstrtouint_from_user+0x1a0/0x200 [ 164.207738][ T5696] ? kstrtol_from_user+0x260/0x260 [ 164.212841][ T5696] ? putname+0x111/0x160 [ 164.217078][ T5696] ? avc_policy_seqno+0x1b/0x70 [ 164.221922][ T5696] ? selinux_file_permission+0x2aa/0x510 [ 164.227556][ T5696] tun_chr_write_iter+0x1eb/0x2e0 [ 164.232589][ T5696] vfs_write+0x802/0xf70 [ 164.236847][ T5696] ? file_end_write+0x1b0/0x1b0 [ 164.241696][ T5696] ? __fget_files+0x2c4/0x320 [ 164.246392][ T5696] ? __fdget_pos+0x1f7/0x380 [ 164.251039][ T5696] ? ksys_write+0x71/0x240 [ 164.255456][ T5696] ksys_write+0x140/0x240 [ 164.259790][ T5696] ? __ia32_sys_read+0x90/0x90 [ 164.264554][ T5696] ? debug_smp_processor_id+0x17/0x20 [ 164.269929][ T5696] __x64_sys_write+0x7b/0x90 [ 164.274518][ T5696] x64_sys_call+0x8ef/0x9a0 [ 164.279039][ T5696] do_syscall_64+0x4c/0xa0 [ 164.283468][ T5696] ? clear_bhb_loop+0x35/0x90 [ 164.288161][ T5696] ? clear_bhb_loop+0x35/0x90 [ 164.292838][ T5696] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 164.298751][ T5696] RIP: 0033:0x7ff6d9aa8969 [ 164.303171][ T5696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 164.322775][ T5696] RSP: 002b:00007ff6d8111038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 164.331199][ T5696] RAX: ffffffffffffffda RBX: 00007ff6d9ccffa0 RCX: 00007ff6d9aa8969 [ 164.339181][ T5696] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 164.347154][ T5696] RBP: 00007ff6d8111090 R08: 0000000000000000 R09: 0000000000000000 [ 164.355126][ T5696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 164.363100][ T5696] R13: 0000000000000000 R14: 00007ff6d9ccffa0 R15: 00007ffebee1ed08 [ 164.371085][ T5696] [ 164.445735][ T5705] device wg2 left promiscuous mode [ 164.502746][ T5700] device veth1_macvtap left promiscuous mode [ 164.508780][ T5700] device macsec0 entered promiscuous mode [ 164.680493][ T5705] device wg2 entered promiscuous mode [ 164.909175][ T5727] ŞŞŞŞŞŞ: renamed from vlan0 [ 164.988118][ T5735] device bridge_slave_1 left promiscuous mode [ 165.001351][ T5735] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.050295][ T5735] device bridge_slave_0 left promiscuous mode [ 165.060058][ T5735] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.073928][ T5742] FAULT_INJECTION: forcing a failure. [ 165.073928][ T5742] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 165.091131][ T5742] CPU: 0 PID: 5742 Comm: syz.4.1682 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 165.101078][ T5742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 165.111151][ T5742] Call Trace: [ 165.114443][ T5742] [ 165.117379][ T5742] __dump_stack+0x21/0x30 [ 165.121724][ T5742] dump_stack_lvl+0xee/0x150 [ 165.126312][ T5742] ? show_regs_print_info+0x20/0x20 [ 165.131512][ T5742] dump_stack+0x15/0x20 [ 165.135663][ T5742] should_fail+0x3c1/0x510 [ 165.140077][ T5742] should_fail_usercopy+0x1a/0x20 [ 165.145098][ T5742] _copy_from_iter+0x21a/0x1050 [ 165.149942][ T5742] ? __kasan_check_write+0x14/0x20 [ 165.155048][ T5742] ? skb_set_owner_w+0x24d/0x370 [ 165.159982][ T5742] ? copy_mc_pipe_to_iter+0x770/0x770 [ 165.165349][ T5742] ? check_stack_object+0x81/0x140 [ 165.170457][ T5742] ? __kasan_check_read+0x11/0x20 [ 165.175476][ T5742] ? __check_object_size+0x2f4/0x3c0 [ 165.180758][ T5742] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 165.186481][ T5742] ? skb_put+0x10e/0x1f0 [ 165.190719][ T5742] tun_get_user+0xc3c/0x33c0 [ 165.195307][ T5742] ? __kasan_check_write+0x14/0x20 [ 165.200415][ T5742] ? tun_do_read+0x1c40/0x1c40 [ 165.205184][ T5742] ? kstrtouint_from_user+0x1a0/0x200 [ 165.210563][ T5742] ? kstrtol_from_user+0x260/0x260 [ 165.215676][ T5742] ? avc_policy_seqno+0x1b/0x70 [ 165.220522][ T5742] ? selinux_file_permission+0x2aa/0x510 [ 165.226150][ T5742] tun_chr_write_iter+0x1eb/0x2e0 [ 165.231188][ T5742] vfs_write+0x802/0xf70 [ 165.235430][ T5742] ? file_end_write+0x1b0/0x1b0 [ 165.240279][ T5742] ? __fget_files+0x2c4/0x320 [ 165.245072][ T5742] ? __fdget_pos+0x1f7/0x380 [ 165.249678][ T5742] ? ksys_write+0x71/0x240 [ 165.254119][ T5742] ksys_write+0x140/0x240 [ 165.258460][ T5742] ? __ia32_sys_read+0x90/0x90 [ 165.263246][ T5742] ? debug_smp_processor_id+0x17/0x20 [ 165.268643][ T5742] __x64_sys_write+0x7b/0x90 [ 165.273241][ T5742] x64_sys_call+0x8ef/0x9a0 [ 165.277775][ T5742] do_syscall_64+0x4c/0xa0 [ 165.282210][ T5742] ? clear_bhb_loop+0x35/0x90 [ 165.286890][ T5742] ? clear_bhb_loop+0x35/0x90 [ 165.291581][ T5742] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 165.297491][ T5742] RIP: 0033:0x7f9ee2964969 [ 165.301906][ T5742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.321526][ T5742] RSP: 002b:00007f9ee0fcd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 165.329939][ T5742] RAX: ffffffffffffffda RBX: 00007f9ee2b8bfa0 RCX: 00007f9ee2964969 [ 165.337927][ T5742] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 165.345893][ T5742] RBP: 00007f9ee0fcd090 R08: 0000000000000000 R09: 0000000000000000 [ 165.353864][ T5742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.361830][ T5742] R13: 0000000000000000 R14: 00007f9ee2b8bfa0 R15: 00007ffcd0e44638 [ 165.369818][ T5742] [ 165.554441][ T5747] device wg2 left promiscuous mode [ 165.914144][ T5751] device macsec0 entered promiscuous mode [ 165.971791][ T5747] device wg2 entered promiscuous mode [ 166.534011][ T5780] FAULT_INJECTION: forcing a failure. [ 166.534011][ T5780] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 166.593560][ T5780] CPU: 1 PID: 5780 Comm: syz.3.1696 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 166.603498][ T5780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 166.613567][ T5780] Call Trace: [ 166.616863][ T5780] [ 166.619799][ T5780] __dump_stack+0x21/0x30 [ 166.624143][ T5780] dump_stack_lvl+0xee/0x150 [ 166.628832][ T5780] ? show_regs_print_info+0x20/0x20 [ 166.634048][ T5780] dump_stack+0x15/0x20 [ 166.638224][ T5780] should_fail+0x3c1/0x510 [ 166.642650][ T5780] should_fail_usercopy+0x1a/0x20 [ 166.647687][ T5780] _copy_to_user+0x20/0x90 [ 166.652116][ T5780] simple_read_from_buffer+0xe9/0x160 [ 166.657504][ T5780] proc_fail_nth_read+0x19a/0x210 [ 166.662547][ T5780] ? proc_fault_inject_write+0x2f0/0x2f0 [ 166.668208][ T5780] ? security_file_permission+0x83/0xa0 [ 166.673768][ T5780] ? proc_fault_inject_write+0x2f0/0x2f0 [ 166.679413][ T5780] vfs_read+0x282/0xbe0 [ 166.683584][ T5780] ? kernel_read+0x1f0/0x1f0 [ 166.688183][ T5780] ? __kasan_check_write+0x14/0x20 [ 166.693307][ T5780] ? mutex_lock+0x95/0x1a0 [ 166.697739][ T5780] ? wait_for_completion_killable_timeout+0x10/0x10 [ 166.704333][ T5780] ? __fget_files+0x2c4/0x320 [ 166.709028][ T5780] ? __fdget_pos+0x2d2/0x380 [ 166.713627][ T5780] ? ksys_read+0x71/0x240 [ 166.717961][ T5780] ksys_read+0x140/0x240 [ 166.722211][ T5780] ? vfs_write+0xf70/0xf70 [ 166.726642][ T5780] ? debug_smp_processor_id+0x17/0x20 [ 166.732023][ T5780] __x64_sys_read+0x7b/0x90 [ 166.736535][ T5780] x64_sys_call+0x96d/0x9a0 [ 166.741048][ T5780] do_syscall_64+0x4c/0xa0 [ 166.745476][ T5780] ? clear_bhb_loop+0x35/0x90 [ 166.750159][ T5780] ? clear_bhb_loop+0x35/0x90 [ 166.754843][ T5780] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.760952][ T5780] RIP: 0033:0x7ff6d9aa737c [ 166.765381][ T5780] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 166.784998][ T5780] RSP: 002b:00007ff6d8111030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 166.793428][ T5780] RAX: ffffffffffffffda RBX: 00007ff6d9ccffa0 RCX: 00007ff6d9aa737c [ 166.801410][ T5780] RDX: 000000000000000f RSI: 00007ff6d81110a0 RDI: 0000000000000009 [ 166.809397][ T5780] RBP: 00007ff6d8111090 R08: 0000000000000000 R09: 0000000000000000 [ 166.817377][ T5780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.825367][ T5780] R13: 0000000000000000 R14: 00007ff6d9ccffa0 R15: 00007ffebee1ed08 [ 166.833364][ T5780] [ 167.208053][ T5811] device wg2 left promiscuous mode [ 167.268690][ T5813] device wg2 entered promiscuous mode [ 167.467580][ T5830] syz.4.1714[5830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.467689][ T5830] syz.4.1714[5830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.591983][ T5830] syz.4.1714[5830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.609600][ T5830] syz.4.1714[5830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.736723][ T5846] FAULT_INJECTION: forcing a failure. [ 167.736723][ T5846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 167.832445][ T5846] CPU: 1 PID: 5846 Comm: syz.3.1721 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 167.842400][ T5846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 167.852497][ T5846] Call Trace: [ 167.855778][ T5846] [ 167.858702][ T5846] __dump_stack+0x21/0x30 [ 167.863033][ T5846] dump_stack_lvl+0xee/0x150 [ 167.867647][ T5846] ? show_regs_print_info+0x20/0x20 [ 167.872949][ T5846] ? has_cap_mac_admin+0x330/0x330 [ 167.878070][ T5846] dump_stack+0x15/0x20 [ 167.882229][ T5846] should_fail+0x3c1/0x510 [ 167.886663][ T5846] should_fail_usercopy+0x1a/0x20 [ 167.891706][ T5846] _copy_from_user+0x20/0xd0 [ 167.896313][ T5846] get_user_ifreq+0x6c/0x180 [ 167.900923][ T5846] sock_ioctl+0x605/0x6b0 [ 167.905320][ T5846] ? sock_poll+0x3d0/0x3d0 [ 167.909772][ T5846] ? security_file_ioctl+0x84/0xa0 [ 167.914880][ T5846] ? sock_poll+0x3d0/0x3d0 [ 167.919307][ T5846] __se_sys_ioctl+0x121/0x1a0 [ 167.924003][ T5846] __x64_sys_ioctl+0x7b/0x90 [ 167.928609][ T5846] x64_sys_call+0x2f/0x9a0 [ 167.933037][ T5846] do_syscall_64+0x4c/0xa0 [ 167.937501][ T5846] ? clear_bhb_loop+0x35/0x90 [ 167.942175][ T5846] ? clear_bhb_loop+0x35/0x90 [ 167.946851][ T5846] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 167.952744][ T5846] RIP: 0033:0x7ff6d9aa8969 [ 167.957159][ T5846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.977278][ T5846] RSP: 002b:00007ff6d8111038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 167.985694][ T5846] RAX: ffffffffffffffda RBX: 00007ff6d9ccffa0 RCX: 00007ff6d9aa8969 [ 167.993660][ T5846] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 168.001629][ T5846] RBP: 00007ff6d8111090 R08: 0000000000000000 R09: 0000000000000000 [ 168.009591][ T5846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 168.017554][ T5846] R13: 0000000000000000 R14: 00007ff6d9ccffa0 R15: 00007ffebee1ed08 [ 168.025531][ T5846] [ 168.152034][ T5844] device wg2 left promiscuous mode [ 168.172598][ T5848] device wg2 entered promiscuous mode [ 168.975234][ T5860] device pim6reg1 entered promiscuous mode [ 169.449251][ T5884] device wg2 left promiscuous mode [ 169.492407][ T5888] bond_slave_1: mtu less than device minimum [ 169.612664][ T5889] FAULT_INJECTION: forcing a failure. [ 169.612664][ T5889] name failslab, interval 1, probability 0, space 0, times 0 [ 169.672172][ T5889] CPU: 1 PID: 5889 Comm: syz.3.1735 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 169.682113][ T5889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 169.692180][ T5889] Call Trace: [ 169.695477][ T5889] [ 169.698409][ T5889] __dump_stack+0x21/0x30 [ 169.702761][ T5889] dump_stack_lvl+0xee/0x150 [ 169.707363][ T5889] ? show_regs_print_info+0x20/0x20 [ 169.712576][ T5889] ? avc_has_perm_noaudit+0x460/0x460 [ 169.717959][ T5889] dump_stack+0x15/0x20 [ 169.722123][ T5889] should_fail+0x3c1/0x510 [ 169.726547][ T5889] __should_failslab+0xa4/0xe0 [ 169.731319][ T5889] should_failslab+0x9/0x20 [ 169.735828][ T5889] slab_pre_alloc_hook+0x3b/0xe0 [ 169.740778][ T5889] kmem_cache_alloc_trace+0x48/0x270 [ 169.746078][ T5889] ? __request_module+0x273/0x8a0 [ 169.751127][ T5889] ? dev_load+0x5b/0xb0 [ 169.755290][ T5889] __request_module+0x273/0x8a0 [ 169.760155][ T5889] ? _trace_android_vh_delayacct_thrashing_end+0x110/0x110 [ 169.767375][ T5889] ? has_cap_mac_admin+0x330/0x330 [ 169.772500][ T5889] ? cap_capable+0x1aa/0x230 [ 169.777117][ T5889] ? security_capable+0x87/0xb0 [ 169.781986][ T5889] dev_load+0x5b/0xb0 [ 169.785999][ T5889] dev_ioctl+0x5e6/0xd10 [ 169.790249][ T5889] sock_ioctl+0x64a/0x6b0 [ 169.794588][ T5889] ? sock_poll+0x3d0/0x3d0 [ 169.799014][ T5889] ? security_file_ioctl+0x84/0xa0 [ 169.804138][ T5889] ? sock_poll+0x3d0/0x3d0 [ 169.808560][ T5889] __se_sys_ioctl+0x121/0x1a0 [ 169.813342][ T5889] __x64_sys_ioctl+0x7b/0x90 [ 169.817957][ T5889] x64_sys_call+0x2f/0x9a0 [ 169.822382][ T5889] do_syscall_64+0x4c/0xa0 [ 169.826809][ T5889] ? clear_bhb_loop+0x35/0x90 [ 169.831490][ T5889] ? clear_bhb_loop+0x35/0x90 [ 169.836172][ T5889] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 169.842078][ T5889] RIP: 0033:0x7ff6d9aa8969 [ 169.846512][ T5889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.866130][ T5889] RSP: 002b:00007ff6d8111038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 169.874559][ T5889] RAX: ffffffffffffffda RBX: 00007ff6d9ccffa0 RCX: 00007ff6d9aa8969 [ 169.882539][ T5889] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 169.890521][ T5889] RBP: 00007ff6d8111090 R08: 0000000000000000 R09: 0000000000000000 [ 169.898497][ T5889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 169.906477][ T5889] R13: 0000000000000000 R14: 00007ff6d9ccffa0 R15: 00007ffebee1ed08 [ 169.914466][ T5889] [ 169.962177][ T30] audit: type=1400 audit(1747477279.844:159): avc: denied { sys_module } for pid=5886 comm="syz.3.1735" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 170.027735][ T5884] device wg2 entered promiscuous mode [ 171.029881][ T5925] FAULT_INJECTION: forcing a failure. [ 171.029881][ T5925] name failslab, interval 1, probability 0, space 0, times 0 [ 171.052188][ T5925] CPU: 1 PID: 5925 Comm: syz.2.1749 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 171.062119][ T5925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 171.072186][ T5925] Call Trace: [ 171.075476][ T5925] [ 171.078412][ T5925] __dump_stack+0x21/0x30 [ 171.082759][ T5925] dump_stack_lvl+0xee/0x150 [ 171.087366][ T5925] ? show_regs_print_info+0x20/0x20 [ 171.092576][ T5925] dump_stack+0x15/0x20 [ 171.096736][ T5925] should_fail+0x3c1/0x510 [ 171.101158][ T5925] __should_failslab+0xa4/0xe0 [ 171.105934][ T5925] should_failslab+0x9/0x20 [ 171.110448][ T5925] slab_pre_alloc_hook+0x3b/0xe0 [ 171.115403][ T5925] ? __request_module+0x28f/0x8a0 [ 171.120439][ T5925] __kmalloc_track_caller+0x6c/0x2c0 [ 171.125730][ T5925] ? __request_module+0x28f/0x8a0 [ 171.130802][ T5925] kstrdup+0x36/0x70 [ 171.134710][ T5925] __request_module+0x28f/0x8a0 [ 171.139583][ T5925] ? _trace_android_vh_delayacct_thrashing_end+0x110/0x110 [ 171.146798][ T5925] ? has_cap_mac_admin+0x330/0x330 [ 171.151927][ T5925] ? cap_capable+0x1aa/0x230 [ 171.156530][ T5925] ? security_capable+0x87/0xb0 [ 171.161387][ T5925] dev_load+0x5b/0xb0 [ 171.165378][ T5925] dev_ioctl+0x5e6/0xd10 [ 171.169627][ T5925] sock_ioctl+0x64a/0x6b0 [ 171.173982][ T5925] ? sock_poll+0x3d0/0x3d0 [ 171.178409][ T5925] ? security_file_ioctl+0x84/0xa0 [ 171.183531][ T5925] ? sock_poll+0x3d0/0x3d0 [ 171.187956][ T5925] __se_sys_ioctl+0x121/0x1a0 [ 171.192644][ T5925] __x64_sys_ioctl+0x7b/0x90 [ 171.197248][ T5925] x64_sys_call+0x2f/0x9a0 [ 171.201669][ T5925] do_syscall_64+0x4c/0xa0 [ 171.206105][ T5925] ? clear_bhb_loop+0x35/0x90 [ 171.210787][ T5925] ? clear_bhb_loop+0x35/0x90 [ 171.215474][ T5925] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 171.221377][ T5925] RIP: 0033:0x7f37f678c969 [ 171.225799][ T5925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.245410][ T5925] RSP: 002b:00007f37f4df5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 171.253833][ T5925] RAX: ffffffffffffffda RBX: 00007f37f69b3fa0 RCX: 00007f37f678c969 [ 171.261811][ T5925] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 171.269785][ T5925] RBP: 00007f37f4df5090 R08: 0000000000000000 R09: 0000000000000000 [ 171.277758][ T5925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.285734][ T5925] R13: 0000000000000000 R14: 00007f37f69b3fa0 R15: 00007ffe4fdae178 [ 171.293720][ T5925] [ 171.592929][ T5939] device wg2 left promiscuous mode [ 171.728203][ T5937] device wg2 entered promiscuous mode [ 171.950229][ T5955] device sit0 left promiscuous mode [ 172.018236][ T5958] device sit0 entered promiscuous mode [ 172.854445][ T5970] FAULT_INJECTION: forcing a failure. [ 172.854445][ T5970] name failslab, interval 1, probability 0, space 0, times 0 [ 172.929723][ T5970] CPU: 0 PID: 5970 Comm: syz.3.1763 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 172.939662][ T5970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 172.949752][ T5970] Call Trace: [ 172.953144][ T5970] [ 172.956078][ T5970] __dump_stack+0x21/0x30 [ 172.960407][ T5970] dump_stack_lvl+0xee/0x150 [ 172.964989][ T5970] ? show_regs_print_info+0x20/0x20 [ 172.970189][ T5970] dump_stack+0x15/0x20 [ 172.974332][ T5970] should_fail+0x3c1/0x510 [ 172.978740][ T5970] __should_failslab+0xa4/0xe0 [ 172.983492][ T5970] should_failslab+0x9/0x20 [ 172.987980][ T5970] slab_pre_alloc_hook+0x3b/0xe0 [ 172.992909][ T5970] kmem_cache_alloc_trace+0x48/0x270 [ 172.998183][ T5970] ? call_usermodehelper_setup+0x8e/0x210 [ 173.003905][ T5970] call_usermodehelper_setup+0x8e/0x210 [ 173.009481][ T5970] ? __request_module+0x8a0/0x8a0 [ 173.014501][ T5970] __request_module+0x35d/0x8a0 [ 173.019699][ T5970] ? _trace_android_vh_delayacct_thrashing_end+0x110/0x110 [ 173.026891][ T5970] ? has_cap_mac_admin+0x330/0x330 [ 173.031990][ T5970] ? cap_capable+0x1aa/0x230 [ 173.036577][ T5970] ? security_capable+0x87/0xb0 [ 173.041443][ T5970] dev_load+0x5b/0xb0 [ 173.045412][ T5970] dev_ioctl+0x5e6/0xd10 [ 173.049641][ T5970] sock_ioctl+0x64a/0x6b0 [ 173.053958][ T5970] ? sock_poll+0x3d0/0x3d0 [ 173.058362][ T5970] ? security_file_ioctl+0x84/0xa0 [ 173.063462][ T5970] ? sock_poll+0x3d0/0x3d0 [ 173.067878][ T5970] __se_sys_ioctl+0x121/0x1a0 [ 173.072550][ T5970] __x64_sys_ioctl+0x7b/0x90 [ 173.077215][ T5970] x64_sys_call+0x2f/0x9a0 [ 173.081622][ T5970] do_syscall_64+0x4c/0xa0 [ 173.086031][ T5970] ? clear_bhb_loop+0x35/0x90 [ 173.090706][ T5970] ? clear_bhb_loop+0x35/0x90 [ 173.095382][ T5970] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 173.101282][ T5970] RIP: 0033:0x7ff6d9aa8969 [ 173.105686][ T5970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.125282][ T5970] RSP: 002b:00007ff6d8111038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 173.133688][ T5970] RAX: ffffffffffffffda RBX: 00007ff6d9ccffa0 RCX: 00007ff6d9aa8969 [ 173.141653][ T5970] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 173.149619][ T5970] RBP: 00007ff6d8111090 R08: 0000000000000000 R09: 0000000000000000 [ 173.157582][ T5970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.165559][ T5970] R13: 0000000000000000 R14: 00007ff6d9ccffa0 R15: 00007ffebee1ed08 [ 173.173967][ T5970] [ 173.354970][ T5979] bond_slave_1: mtu less than device minimum [ 173.610140][ T5991] device wg2 left promiscuous mode [ 173.733723][ T5993] device wg2 entered promiscuous mode [ 173.916964][ T6001] device pim6reg1 entered promiscuous mode [ 173.950201][ T6004] device sit0 left promiscuous mode [ 174.025839][ T6004] device sit0 entered promiscuous mode [ 174.327740][ T6022] FAULT_INJECTION: forcing a failure. [ 174.327740][ T6022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.372402][ T6022] CPU: 0 PID: 6022 Comm: syz.4.1780 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 174.382357][ T6022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 174.392433][ T6022] Call Trace: [ 174.395744][ T6022] [ 174.398698][ T6022] __dump_stack+0x21/0x30 [ 174.403056][ T6022] dump_stack_lvl+0xee/0x150 [ 174.407674][ T6022] ? show_regs_print_info+0x20/0x20 [ 174.412897][ T6022] dump_stack+0x15/0x20 [ 174.417072][ T6022] should_fail+0x3c1/0x510 [ 174.421510][ T6022] should_fail_usercopy+0x1a/0x20 [ 174.426556][ T6022] _copy_to_user+0x20/0x90 [ 174.430997][ T6022] simple_read_from_buffer+0xe9/0x160 [ 174.436390][ T6022] proc_fail_nth_read+0x19a/0x210 [ 174.441446][ T6022] ? proc_fault_inject_write+0x2f0/0x2f0 [ 174.447102][ T6022] ? security_file_permission+0x83/0xa0 [ 174.452673][ T6022] ? proc_fault_inject_write+0x2f0/0x2f0 [ 174.458330][ T6022] vfs_read+0x282/0xbe0 [ 174.462514][ T6022] ? check_stack_object+0x126/0x140 [ 174.467745][ T6022] ? kernel_read+0x1f0/0x1f0 [ 174.472353][ T6022] ? __kasan_check_read+0x11/0x20 [ 174.477399][ T6022] ? __kasan_check_write+0x14/0x20 [ 174.482577][ T6022] ? mutex_lock+0x95/0x1a0 [ 174.487017][ T6022] ? wait_for_completion_killable_timeout+0x10/0x10 [ 174.493631][ T6022] ? __fget_files+0x2c4/0x320 [ 174.498339][ T6022] ? __fdget_pos+0x2d2/0x380 [ 174.502949][ T6022] ? ksys_read+0x71/0x240 [ 174.507297][ T6022] ksys_read+0x140/0x240 [ 174.511560][ T6022] ? vfs_write+0xf70/0xf70 [ 174.516169][ T6022] ? __kasan_check_write+0x14/0x20 [ 174.521306][ T6022] ? switch_fpu_return+0x15d/0x2c0 [ 174.526721][ T6022] __x64_sys_read+0x7b/0x90 [ 174.531335][ T6022] x64_sys_call+0x96d/0x9a0 [ 174.535864][ T6022] do_syscall_64+0x4c/0xa0 [ 174.540316][ T6022] ? clear_bhb_loop+0x35/0x90 [ 174.545011][ T6022] ? clear_bhb_loop+0x35/0x90 [ 174.549709][ T6022] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 174.555628][ T6022] RIP: 0033:0x7f9ee296337c [ 174.560068][ T6022] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 174.579697][ T6022] RSP: 002b:00007f9ee0fcd030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 174.588135][ T6022] RAX: ffffffffffffffda RBX: 00007f9ee2b8bfa0 RCX: 00007f9ee296337c [ 174.596129][ T6022] RDX: 000000000000000f RSI: 00007f9ee0fcd0a0 RDI: 0000000000000005 [ 174.604126][ T6022] RBP: 00007f9ee0fcd090 R08: 0000000000000000 R09: 0000000000000000 [ 174.612119][ T6022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.620106][ T6022] R13: 0000000000000000 R14: 00007f9ee2b8bfa0 R15: 00007ffcd0e44638 [ 174.628107][ T6022] [ 175.146078][ T6041] device wg2 left promiscuous mode [ 175.176303][ T6044] device wg2 entered promiscuous mode [ 175.533644][ T30] audit: type=1400 audit(1747477285.424:160): avc: denied { create } for pid=6071 comm="syz.2.1796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 177.433103][ T6190] device sit0 entered promiscuous mode [ 178.303826][ T6250] device pim6reg1 entered promiscuous mode [ 178.437588][ T6262] device wg2 left promiscuous mode [ 178.605700][ T6277] syz.2.1859[6277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.605782][ T6277] syz.2.1859[6277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.006445][ T6286] device wg2 entered promiscuous mode [ 179.109749][ T6300] device sit0 left promiscuous mode [ 179.171480][ T6295] device sit0 entered promiscuous mode [ 182.623692][ T6436] device wg2 left promiscuous mode [ 182.677823][ T6441] device wg2 entered promiscuous mode [ 182.692768][ T6439] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.700014][ T6439] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.084098][ T30] audit: type=1400 audit(1747477292.974:161): avc: denied { create } for pid=6470 comm="syz.1.1926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 183.208465][ T6472] device pim6reg1 entered promiscuous mode [ 183.653657][ T6482] device wg2 left promiscuous mode [ 183.748590][ T6482] device wg2 entered promiscuous mode [ 184.246804][ T6522] bond_slave_1: mtu less than device minimum [ 184.563316][ T6543] device wg2 left promiscuous mode [ 184.705040][ T6547] device wg2 entered promiscuous mode [ 185.089563][ T6562] device syzkaller0 entered promiscuous mode [ 185.354103][ T6585] device wg2 left promiscuous mode [ 185.556345][ T6585] device wg2 entered promiscuous mode [ 185.950065][ T6640] device wg2 left promiscuous mode [ 186.052208][ T6646] device wg2 entered promiscuous mode [ 186.382481][ T6649] device wg2 left promiscuous mode [ 195.457110][ T6686] device wg2 entered promiscuous mode [ 195.822493][ T6721] device sit0 left promiscuous mode [ 195.823104][ T6725] syz.3.2007[6725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.842066][ T6725] syz.3.2007[6725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.983484][ T6735] device syzkaller0 entered promiscuous mode [ 196.361612][ T6749] device wg2 left promiscuous mode [ 196.765535][ T6744] device wg2 entered promiscuous mode [ 197.580081][ T6789] device wg2 left promiscuous mode [ 197.651698][ T6793] device wg2 entered promiscuous mode [ 197.913624][ T6810] FAULT_INJECTION: forcing a failure. [ 197.913624][ T6810] name failslab, interval 1, probability 0, space 0, times 0 [ 197.936834][ T6810] CPU: 0 PID: 6810 Comm: syz.3.2037 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 197.946772][ T6810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 197.956845][ T6810] Call Trace: [ 197.960139][ T6810] [ 197.963078][ T6810] __dump_stack+0x21/0x30 [ 197.967434][ T6810] dump_stack_lvl+0xee/0x150 [ 197.972059][ T6810] ? show_regs_print_info+0x20/0x20 [ 197.977275][ T6810] ? file_end_write+0x1b0/0x1b0 [ 197.982148][ T6810] dump_stack+0x15/0x20 [ 197.986319][ T6810] should_fail+0x3c1/0x510 [ 197.990748][ T6810] __should_failslab+0xa4/0xe0 [ 197.995524][ T6810] should_failslab+0x9/0x20 [ 198.000044][ T6810] slab_pre_alloc_hook+0x3b/0xe0 [ 198.005022][ T6810] ? getname_flags+0xb9/0x500 [ 198.009710][ T6810] kmem_cache_alloc+0x44/0x260 [ 198.014484][ T6810] getname_flags+0xb9/0x500 [ 198.018998][ T6810] ? __bpf_trace_sys_enter+0x62/0x70 [ 198.024308][ T6810] __x64_sys_mkdir+0x5f/0x80 [ 198.028909][ T6810] x64_sys_call+0x124/0x9a0 [ 198.033426][ T6810] do_syscall_64+0x4c/0xa0 [ 198.037863][ T6810] ? clear_bhb_loop+0x35/0x90 [ 198.042553][ T6810] ? clear_bhb_loop+0x35/0x90 [ 198.047247][ T6810] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 198.053249][ T6810] RIP: 0033:0x7ff6d9aa8969 [ 198.057677][ T6810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.077293][ T6810] RSP: 002b:00007ff6d8111038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 198.085720][ T6810] RAX: ffffffffffffffda RBX: 00007ff6d9ccffa0 RCX: 00007ff6d9aa8969 [ 198.093703][ T6810] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 198.101687][ T6810] RBP: 00007ff6d8111090 R08: 0000000000000000 R09: 0000000000000000 [ 198.109665][ T6810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.117649][ T6810] R13: 0000000000000000 R14: 00007ff6d9ccffa0 R15: 00007ffebee1ed08 [ 198.125646][ T6810] [ 198.720990][ T6840] device wg2 left promiscuous mode [ 198.821079][ T6837] device wg2 entered promiscuous mode [ 198.864924][ T6848] FAULT_INJECTION: forcing a failure. [ 198.864924][ T6848] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 198.933994][ T6848] CPU: 1 PID: 6848 Comm: syz.0.2050 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 198.943942][ T6848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 198.954023][ T6848] Call Trace: [ 198.957345][ T6848] [ 198.960287][ T6848] __dump_stack+0x21/0x30 [ 198.964640][ T6848] dump_stack_lvl+0xee/0x150 [ 198.969260][ T6848] ? show_regs_print_info+0x20/0x20 [ 198.974487][ T6848] dump_stack+0x15/0x20 [ 198.978657][ T6848] should_fail+0x3c1/0x510 [ 198.983089][ T6848] should_fail_usercopy+0x1a/0x20 [ 198.988121][ T6848] strncpy_from_user+0x24/0x2e0 [ 198.992983][ T6848] ? kmem_cache_alloc+0xf7/0x260 [ 198.997942][ T6848] getname_flags+0xf4/0x500 [ 199.002461][ T6848] __x64_sys_mkdir+0x5f/0x80 [ 199.007060][ T6848] x64_sys_call+0x124/0x9a0 [ 199.011582][ T6848] do_syscall_64+0x4c/0xa0 [ 199.016008][ T6848] ? clear_bhb_loop+0x35/0x90 [ 199.020693][ T6848] ? clear_bhb_loop+0x35/0x90 [ 199.025378][ T6848] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 199.031286][ T6848] RIP: 0033:0x7f4d2472e969 [ 199.035711][ T6848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.055328][ T6848] RSP: 002b:00007f4d22d97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 199.063756][ T6848] RAX: ffffffffffffffda RBX: 00007f4d24955fa0 RCX: 00007f4d2472e969 [ 199.071753][ T6848] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 199.079733][ T6848] RBP: 00007f4d22d97090 R08: 0000000000000000 R09: 0000000000000000 [ 199.087710][ T6848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.095684][ T6848] R13: 0000000000000000 R14: 00007f4d24955fa0 R15: 00007ffc15a87b58 [ 199.103675][ T6848] [ 199.343474][ T6878] tap0: tun_chr_ioctl cmd 2147767521 [ 199.494769][ T6887] device wg2 left promiscuous mode [ 199.558805][ T6887] device wg2 entered promiscuous mode [ 199.680058][ T6899] FAULT_INJECTION: forcing a failure. [ 199.680058][ T6899] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 199.714427][ T6899] CPU: 1 PID: 6899 Comm: syz.2.2069 Not tainted 5.15.182-syzkaller-00462-g57725b368731 #0 [ 199.724365][ T6899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 199.734433][ T6899] Call Trace: [ 199.737718][ T6899] [ 199.740654][ T6899] __dump_stack+0x21/0x30 [ 199.745001][ T6899] dump_stack_lvl+0xee/0x150 [ 199.749602][ T6899] ? show_regs_print_info+0x20/0x20 [ 199.754815][ T6899] dump_stack+0x15/0x20 [ 199.758981][ T6899] should_fail+0x3c1/0x510 [ 199.763407][ T6899] should_fail_usercopy+0x1a/0x20 [ 199.768445][ T6899] _copy_to_user+0x20/0x90 [ 199.772875][ T6899] simple_read_from_buffer+0xe9/0x160 [ 199.778301][ T6899] proc_fail_nth_read+0x19a/0x210 [ 199.783341][ T6899] ? proc_fault_inject_write+0x2f0/0x2f0 [ 199.788986][ T6899] ? security_file_permission+0x83/0xa0 [ 199.794545][ T6899] ? proc_fault_inject_write+0x2f0/0x2f0 [ 199.800190][ T6899] vfs_read+0x282/0xbe0 [ 199.804353][ T6899] ? kernel_read+0x1f0/0x1f0 [ 199.808948][ T6899] ? bpf_trace_run3+0xd1/0x1e0 [ 199.813721][ T6899] ? __kasan_check_write+0x14/0x20 [ 199.818842][ T6899] ? mutex_lock+0x95/0x1a0 [ 199.823276][ T6899] ? wait_for_completion_killable_timeout+0x10/0x10 [ 199.829870][ T6899] ? __fget_files+0x2c4/0x320 [ 199.834566][ T6899] ? __fdget_pos+0x2d2/0x380 [ 199.839172][ T6899] ? ksys_read+0x71/0x240 [ 199.843505][ T6899] ksys_read+0x140/0x240 [ 199.847755][ T6899] ? vfs_write+0xf70/0xf70 [ 199.852199][ T6899] ? __bpf_trace_sys_enter+0x62/0x70 [ 199.857496][ T6899] __x64_sys_read+0x7b/0x90 [ 199.862006][ T6899] x64_sys_call+0x96d/0x9a0 [ 199.866521][ T6899] do_syscall_64+0x4c/0xa0 [ 199.870945][ T6899] ? clear_bhb_loop+0x35/0x90 [ 199.875630][ T6899] ? clear_bhb_loop+0x35/0x90 [ 199.880315][ T6899] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 199.886223][ T6899] RIP: 0033:0x7f37f678b37c [ 199.890646][ T6899] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 199.910269][ T6899] RSP: 002b:00007f37f4df5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 199.918786][ T6899] RAX: ffffffffffffffda RBX: 00007f37f69b3fa0 RCX: 00007f37f678b37c [ 199.926770][ T6899] RDX: 000000000000000f RSI: 00007f37f4df50a0 RDI: 0000000000000006 [ 199.934752][ T6899] RBP: 00007f37f4df5090 R08: 0000000000000000 R09: 0000000000000000 [ 199.942734][ T6899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.950737][ T6899] R13: 0000000000000000 R14: 00007f37f69b3fa0 R15: 00007ffe4fdae178 [ 199.959348][ T6899] [ 200.079032][ T6907] device pim6reg1 entered promiscuous mode [ 200.094543][ T6909] device sit0 left promiscuous mode [ 200.223212][ T6913] device sit0 entered promiscuous mode [ 200.481914][ T6927] device wg2 left promiscuous mode [ 200.576146][ T6927] device wg2 entered promiscuous mode [ 200.803383][ T6934] device syzkaller0 entered promiscuous mode [ 201.307023][ T6963] device pim6reg1 entered promiscuous mode [ 201.722309][ T6979] device wg2 left promiscuous mode [ 201.729771][ T6980] device wg2 entered promiscuous mode [ 202.081857][ T6992] device syzkaller0 entered promiscuous mode [ 202.360973][ T7025] device wg2 left promiscuous mode [ 202.625957][ T7025] device wg2 entered promiscuous mode [ 202.653956][ T7041] device pim6reg1 entered promiscuous mode [ 202.704333][ T7043] device bridge_slave_1 left promiscuous mode [ 202.712381][ T7043] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.721898][ T7043] device bridge_slave_0 left promiscuous mode [ 202.728356][ T7043] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.737830][ T30] audit: type=1400 audit(1747477312.624:162): avc: denied { create } for pid=7042 comm="syz.3.2115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 203.220227][ T7059] ref_ctr_offset mismatch. inode: 0x855 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 203.526839][ T7071] device wg2 left promiscuous mode [ 203.668588][ T7088] bond_slave_1: mtu greater than device maximum [ 203.692803][ T7086] device wg2 left promiscuous mode [ 203.891284][ T7086] device wg2 entered promiscuous mode [ 204.183311][ T7111] ref_ctr_offset mismatch. inode: 0x89f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 204.290342][ T7111] GPL: port 1(erspan0) entered blocking state [ 204.297176][ T7111] GPL: port 1(erspan0) entered disabled state [ 204.313974][ T7111] device erspan0 entered promiscuous mode [ 204.349767][ T7119] GPL: port 1(erspan0) entered blocking state [ 204.355906][ T7119] GPL: port 1(erspan0) entered forwarding state [ 204.505267][ T7131] device wg2 left promiscuous mode [ 204.541295][ T7134] ref_ctr_offset mismatch. inode: 0x87c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 204.645587][ T7134] GPL: port 1(erspan0) entered blocking state [ 204.671993][ T7134] GPL: port 1(erspan0) entered disabled state [ 204.700183][ T7134] device erspan0 entered promiscuous mode [ 204.740270][ T7148] device wg2 left promiscuous mode [ 204.768216][ T7150] GPL: port 1(erspan0) entered blocking state [ 204.774355][ T7150] GPL: port 1(erspan0) entered forwarding state [ 204.935478][ T7148] device wg2 entered promiscuous mode [ 205.566803][ T7170] device wg2 entered promiscuous mode [ 205.700765][ T30] audit: type=1400 audit(1747477315.584:163): avc: denied { read } for pid=7175 comm="syz.0.2171" name="cgroup.subtree_control" dev="cgroup2" ino=178 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 205.926965][ T7192] device wg2 left promiscuous mode [ 206.209244][ T7206] ref_ctr_offset mismatch. inode: 0x8ae offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 206.265381][ T7208] device wg2 left promiscuous mode [ 206.357042][ T7214] GPL: port 1(erspan0) entered blocking state [ 206.409595][ T7214] GPL: port 1(erspan0) entered disabled state [ 206.452646][ T7214] device erspan0 entered promiscuous mode [ 206.493146][ T7206] GPL: port 1(erspan0) entered blocking state [ 206.499419][ T7206] GPL: port 1(erspan0) entered forwarding state [ 207.031768][ T7226] device wg2 entered promiscuous mode [ 207.107247][ T7228] device wg2 entered promiscuous mode [ 207.135787][ T7239] ref_ctr_offset mismatch. inode: 0x3b5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 207.913773][ T7279] device wg2 left promiscuous mode [ 208.142993][ T7291] device wg2 left promiscuous mode [ 208.159459][ T7289] ref_ctr_offset mismatch. inode: 0x8c9 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 208.228612][ T7279] device wg2 entered promiscuous mode [ 208.434399][ T7291] device wg2 entered promiscuous mode [ 208.585963][ T7300] device syzkaller0 entered promiscuous mode [ 209.273260][ T7316] device pim6reg1 entered promiscuous mode [ 209.331396][ T30] audit: type=1400 audit(1747477319.214:164): avc: denied { create } for pid=7314 comm="syz.1.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 209.402952][ T7324] device wg2 left promiscuous mode [ 209.461513][ T7327] device wg2 left promiscuous mode [ 209.601741][ T7331] device wg2 left promiscuous mode [ 209.689059][ T7324] device wg2 entered promiscuous mode [ 209.737411][ T7338] ref_ctr_offset mismatch. inode: 0x8b7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 210.158966][ T7343] device pim6reg1 entered promiscuous mode [ 210.176060][ T7357] device wg2 entered promiscuous mode [ 210.184721][ T7359] device wg2 entered promiscuous mode [ 210.376287][ T7371] device wg2 left promiscuous mode [ 210.409757][ T7380] device wg2 left promiscuous mode [ 210.513389][ T7386] device wg2 entered promiscuous mode [ 210.652664][ T7391] device wg2 left promiscuous mode [ 210.696659][ T7397] ref_ctr_offset mismatch. inode: 0x8ec offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 210.884449][ T7411] device wg2 left promiscuous mode [ 210.950760][ T7413] device wg2 left promiscuous mode [ 211.063631][ T7419] device wg2 entered promiscuous mode [ 211.108874][ T7411] device wg2 entered promiscuous mode [ 211.860930][ T316] bridge0: port 3(veth0) entered disabled state [ 211.931590][ T7437] device wg2 entered promiscuous mode [ 212.075526][ T7425] device pim6reg1 entered promiscuous mode [ 212.213235][ T7456] device wg2 left promiscuous mode [ 212.255248][ T7458] device wg2 left promiscuous mode [ 212.390656][ T7458] device wg2 entered promiscuous mode [ 212.552146][ T282] syz-executor (282) used greatest stack depth: 21472 bytes left [ 212.685564][ T7476] device wg2 left promiscuous mode [ 212.747133][ T7473] device wg2 entered promiscuous mode [ 212.775591][ T30] audit: type=1400 audit(1747477322.664:165): avc: denied { mounton } for pid=7483 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 212.910260][ T7486] device wg2 left promiscuous mode [ 212.965090][ T7499] syz.3.2269[7499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.965206][ T7499] syz.3.2269[7499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.005337][ T7476] device wg2 entered promiscuous mode [ 213.041916][ T7483] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.078585][ T7483] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.090880][ T7483] device bridge_slave_0 entered promiscuous mode [ 213.103024][ T7483] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.111455][ T7483] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.119247][ T7483] device bridge_slave_1 entered promiscuous mode [ 213.129382][ T7486] device wg2 entered promiscuous mode [ 213.174369][ T7505] bond_slave_1: mtu less than device minimum [ 213.194742][ T316] GPL: port 1(erspan0) entered disabled state [ 213.212453][ T316] device erspan0 left promiscuous mode [ 213.217972][ T316] GPL: port 1(erspan0) entered disabled state [ 213.695218][ T7508] device pim6reg1 entered promiscuous mode [ 213.734227][ T7513] device wg2 entered promiscuous mode [ 213.823269][ T316] device veth0 left promiscuous mode [ 213.828646][ T316] bridge0: port 3(veth0) entered disabled state [ 213.839557][ T316] device bridge_slave_1 left promiscuous mode [ 213.847551][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.857902][ T316] device bridge_slave_0 left promiscuous mode [ 213.865061][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.053840][ T7521] device wg2 left promiscuous mode [ 214.098899][ T7523] device wg2 entered promiscuous mode [ 214.111981][ T7525] device wg2 left promiscuous mode [ 214.191615][ T7528] device wg2 entered promiscuous mode [ 214.229395][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.257687][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.307305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.336206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.346790][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.353899][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.361568][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.370222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.404476][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.411593][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.452225][ T7544] device wg2 left promiscuous mode [ 214.479947][ T7541] device wg2 left promiscuous mode [ 214.508174][ T7545] device wg2 entered promiscuous mode [ 214.556829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.613428][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.621828][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.682452][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.698116][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.732525][ T7544] device wg2 entered promiscuous mode [ 214.780936][ T7483] device veth0_vlan entered promiscuous mode [ 214.856436][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 214.865035][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 214.873733][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 214.881697][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.890655][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.898320][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.195467][ T7483] device veth1_macvtap entered promiscuous mode [ 215.202571][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 215.237852][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.248305][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.275841][ T30] audit: type=1400 audit(1747477325.164:166): avc: denied { unmount } for pid=7483 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 215.297659][ T7565] bond_slave_1: mtu less than device minimum [ 215.309132][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 215.322523][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 215.342287][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.350795][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.414897][ T7569] device wg2 left promiscuous mode [ 215.451072][ T7572] device wg2 entered promiscuous mode [ 215.563497][ T7576] device wg2 left promiscuous mode [ 215.705489][ T7576] device wg2 entered promiscuous mode [ 215.752294][ T7589] device wg2 left promiscuous mode [ 215.813050][ T7599] device wg2 entered promiscuous mode [ 215.852100][ T7596] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.864947][ T7596] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.873001][ T7596] device bridge_slave_0 entered promiscuous mode [ 215.881430][ T7596] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.888718][ T7596] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.896538][ T7596] device bridge_slave_1 entered promiscuous mode [ 215.964369][ T7596] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.971409][ T7596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.978772][ T7596] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.985834][ T7596] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.011955][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.021466][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.031739][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.043016][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.051216][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.058281][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.071363][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.080702][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.087762][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.103375][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.111571][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.128779][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.139123][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.147313][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.155101][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.164388][ T7596] device veth0_vlan entered promiscuous mode [ 216.175182][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.185394][ T7596] device veth1_macvtap entered promiscuous mode [ 216.195702][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.206088][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 216.443759][ T7618] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.450803][ T7618] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.458450][ T7618] device bridge_slave_0 entered promiscuous mode [ 216.467237][ T7618] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.474335][ T7618] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.481750][ T7618] device bridge_slave_1 entered promiscuous mode [ 216.538168][ T7618] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.545233][ T7618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.552662][ T7618] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.559697][ T7618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.582957][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.590812][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.598328][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.609994][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.618255][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.625296][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.635180][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.643370][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.650480][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.667205][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.677057][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.694040][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.705972][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.714286][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.722000][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.731719][ T422] device bridge_slave_1 left promiscuous mode [ 216.738032][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.745677][ T422] device bridge_slave_0 left promiscuous mode [ 216.751787][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.759944][ T422] device veth1_macvtap left promiscuous mode [ 216.766174][ T422] device veth0_vlan left promiscuous mode [ 216.865795][ T7618] device veth0_vlan entered promiscuous mode [ 216.877342][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.887369][ T7618] device veth1_macvtap entered promiscuous mode [ 216.897451][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.908227][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.155492][ T7623] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.162747][ T7623] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.170250][ T7623] device bridge_slave_0 entered promiscuous mode [ 217.178666][ T7623] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.185878][ T7623] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.193897][ T7623] device bridge_slave_1 entered promiscuous mode [ 217.247920][ T7623] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.255156][ T7623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.262482][ T7623] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.269512][ T7623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.299978][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.308165][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.315789][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.326923][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.335423][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.344661][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.351853][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.365453][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.373873][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.382009][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.389073][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.401795][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.410173][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.423812][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.432018][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.448056][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.456710][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.468717][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.477009][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.485130][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.493508][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.505471][ T7623] device veth0_vlan entered promiscuous mode [ 217.516454][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.524862][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.534497][ T7623] device veth1_macvtap entered promiscuous mode [ 217.548253][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 217.556098][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.564664][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.577390][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.585786][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.923056][ T422] device bridge_slave_1 left promiscuous mode [ 217.929184][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.936802][ T422] device bridge_slave_0 left promiscuous mode [ 217.942999][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.951075][ T422] device bridge_slave_1 left promiscuous mode [ 217.957495][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.965271][ T422] device bridge_slave_0 left promiscuous mode [ 217.971397][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.979779][ T422] device veth1_macvtap left promiscuous mode [ 217.985800][ T422] device veth0_vlan left promiscuous mode [ 217.991775][ T422] device veth1_macvtap left promiscuous mode [ 217.998369][ T422] device veth0_vlan left promiscuous mode [ 218.218773][ T7628] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.225908][ T7628] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.233670][ T7628] device bridge_slave_0 entered promiscuous mode [ 218.242194][ T7628] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.249230][ T7628] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.256755][ T7628] device bridge_slave_1 entered promiscuous mode [ 218.307455][ T7628] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.314526][ T7628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.321801][ T7628] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.328988][ T7628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.350479][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.358117][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.365563][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.375006][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.383459][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.391693][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.398959][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.408344][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.416809][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.425422][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.432491][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.446584][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.454876][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.464339][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.472699][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.488044][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 218.496645][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.508383][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.516433][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.525582][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.533345][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.541342][ T7628] device veth0_vlan entered promiscuous mode [ 218.555601][ T7628] device veth1_macvtap entered promiscuous mode [ 218.562611][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.575375][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.583851][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.600043][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.608415][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.617068][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.625463][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.340560][ T7633] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.347754][ T7633] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.355629][ T7633] device bridge_slave_0 entered promiscuous mode [ 219.364253][ T7633] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.371369][ T7633] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.378996][ T7633] device bridge_slave_1 entered promiscuous mode [ 219.386069][ T422] device bridge_slave_1 left promiscuous mode [ 219.392238][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.399993][ T422] device bridge_slave_0 left promiscuous mode [ 219.406790][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.414867][ T422] device veth1_macvtap left promiscuous mode [ 219.420871][ T422] device veth0_vlan left promiscuous mode [ 219.570285][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.577803][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.587048][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.595567][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.603810][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.610830][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.619324][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.628225][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.636798][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.645315][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.652367][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.665749][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.676514][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.694521][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.706990][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.715535][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.723029][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.731382][ T7633] device veth0_vlan entered promiscuous mode [ 219.742836][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.753309][ T7633] device veth1_macvtap entered promiscuous mode [ 219.763978][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.778276][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.553689][ T316] device bridge_slave_1 left promiscuous mode [ 220.559811][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.567376][ T316] device bridge_slave_0 left promiscuous mode [ 220.573600][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.582011][ T316] device veth1_macvtap left promiscuous mode [ 220.588624][ T316] device veth0_vlan left promiscuous mode [ 220.749532][ T7638] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.756905][ T7638] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.764437][ T7638] device bridge_slave_0 entered promiscuous mode [ 220.771485][ T7638] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.778739][ T7638] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.786259][ T7638] device bridge_slave_1 entered promiscuous mode [ 220.837602][ T7638] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.844768][ T7638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.852120][ T7638] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.859222][ T7638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.880526][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.888508][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.895867][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.905311][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.913640][ T422] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.920666][ T422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.929976][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.938308][ T422] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.945371][ T422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.969568][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.979369][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.995478][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.007778][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.016244][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.023990][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.033753][ T7638] device veth0_vlan entered promiscuous mode [ 221.044662][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.054050][ T7638] device veth1_macvtap entered promiscuous mode [ 221.065500][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.080086][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.872924][ T316] device bridge_slave_1 left promiscuous mode [ 221.879202][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.886971][ T316] device bridge_slave_0 left promiscuous mode [ 221.893289][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.901575][ T316] device veth1_macvtap left promiscuous mode [ 221.907636][ T316] device veth0_vlan left promiscuous mode [ 222.030674][ T7643] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.037845][ T7643] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.045520][ T7643] device bridge_slave_0 entered promiscuous mode [ 222.052858][ T7643] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.059887][ T7643] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.067428][ T7643] device bridge_slave_1 entered promiscuous mode [ 222.123273][ T7643] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.130320][ T7643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.137686][ T7643] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.144747][ T7643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.169515][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.177167][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.184496][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.194127][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.202581][ T422] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.209617][ T422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.218909][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.227243][ T422] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.234345][ T422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.248883][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.270742][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.279687][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.290839][ T7643] device veth0_vlan entered promiscuous mode [ 222.299755][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.309220][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.317646][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.329681][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.339294][ T7643] device veth1_macvtap entered promiscuous mode [ 222.349215][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.360046][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.193384][ T316] device bridge_slave_1 left promiscuous mode [ 223.199529][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.207250][ T316] device bridge_slave_0 left promiscuous mode [ 223.213505][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.221596][ T316] device veth1_macvtap left promiscuous mode [ 223.227787][ T316] device veth0_vlan left promiscuous mode [ 223.370425][ T7648] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.377500][ T7648] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.385173][ T7648] device bridge_slave_0 entered promiscuous mode [ 223.392484][ T7648] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.399622][ T7648] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.407321][ T7648] device bridge_slave_1 entered promiscuous mode [ 223.473494][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.480974][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.493464][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.507334][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.515556][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.522609][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.530230][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.538634][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.546940][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.553987][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.561398][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.578773][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.586766][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.602488][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 223.612975][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.621100][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.629753][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 223.638856][ T7648] device veth0_vlan entered promiscuous mode [ 223.649657][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 223.659179][ T7648] device veth1_macvtap entered promiscuous mode [ 223.669574][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.685439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.512879][ T316] device bridge_slave_1 left promiscuous mode [ 224.519047][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.526690][ T316] device bridge_slave_0 left promiscuous mode [ 224.532985][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.541292][ T316] device veth1_macvtap left promiscuous mode [ 224.547415][ T316] device veth0_vlan left promiscuous mode [ 224.849081][ T7653] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.856300][ T7653] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.863867][ T7653] device bridge_slave_0 entered promiscuous mode [ 224.870862][ T7653] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.878157][ T7653] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.885779][ T7653] device bridge_slave_1 entered promiscuous mode [ 224.944698][ T7653] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.951746][ T7653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.959075][ T7653] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.966131][ T7653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.987340][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.995194][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.002739][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.016682][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.024975][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.031994][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.041834][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.050235][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.057294][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.072958][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.082651][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.099540][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 225.111630][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.119908][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 225.127673][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.138562][ T7653] device veth0_vlan entered promiscuous mode [ 225.149964][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 225.159642][ T7653] device veth1_macvtap entered promiscuous mode [ 225.170115][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 225.184076][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 225.633072][ T316] device bridge_slave_1 left promiscuous mode [ 225.639209][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.646756][ T316] device bridge_slave_0 left promiscuous mode [ 225.653132][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.661108][ T316] device veth1_macvtap left promiscuous mode [ 225.667258][ T316] device veth0_vlan left promiscuous mode [ 226.446345][ T7658] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.453532][ T7658] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.460954][ T7658] device bridge_slave_0 entered promiscuous mode [ 226.468058][ T7658] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.475994][ T7658] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.483522][ T7658] device bridge_slave_1 entered promiscuous mode [ 226.534155][ T7658] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.541194][ T7658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.548511][ T7658] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.555559][ T7658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.564473][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.571787][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.593849][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.601334][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.610266][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.618641][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.627005][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.634054][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.646080][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.654453][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.662988][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.670019][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.682501][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.690783][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.700062][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.708718][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.724905][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 226.733432][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 226.745008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 226.753119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.761439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.769296][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.779846][ T7658] device veth0_vlan entered promiscuous mode [ 226.790486][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 226.798777][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 226.809198][ T7658] device veth1_macvtap entered promiscuous mode [ 226.821015][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 226.828895][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 226.837417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 226.847212][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 226.855702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 227.033158][ T316] device bridge_slave_1 left promiscuous mode [ 227.039316][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.046985][ T316] device bridge_slave_0 left promiscuous mode [ 227.053182][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.061197][ T316] device veth1_macvtap left promiscuous mode [ 227.067416][ T316] device veth0_vlan left promiscuous mode [ 228.187970][ T7663] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.195169][ T7663] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.202886][ T7663] device bridge_slave_0 entered promiscuous mode [ 228.211879][ T7663] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.219096][ T7663] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.226689][ T7663] device bridge_slave_1 entered promiscuous mode [ 228.278125][ T7663] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.285183][ T7663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.292488][ T7663] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.299513][ T7663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.320913][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.328812][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.336211][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.344427][ T316] device bridge_slave_1 left promiscuous mode [ 228.350549][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.358454][ T316] device bridge_slave_0 left promiscuous mode [ 228.364882][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.373203][ T316] device veth1_macvtap left promiscuous mode [ 228.379283][ T316] device veth0_vlan left promiscuous mode [ 228.447927][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.456251][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.463334][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.472676][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.480871][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.487938][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.501888][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.511536][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.526116][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.538631][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.547046][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.554762][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.565041][ T7663] device veth0_vlan entered promiscuous mode [ 228.575706][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.585082][ T7663] device veth1_macvtap entered promiscuous mode [ 228.595262][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.610639][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 228.625090][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.513918][ T316] device bridge_slave_1 left promiscuous mode [ 229.520230][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.527976][ T316] device bridge_slave_0 left promiscuous mode [ 229.534238][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.542180][ T316] device veth1_macvtap left promiscuous mode [ 229.548224][ T316] device veth0_vlan left promiscuous mode [ 229.949185][ T7668] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.956270][ T7668] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.963856][ T7668] device bridge_slave_0 entered promiscuous mode [ 229.970824][ T7668] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.978112][ T7668] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.985616][ T7668] device bridge_slave_1 entered promiscuous mode [ 230.041164][ T7668] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.048469][ T7668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.055804][ T7668] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.062857][ T7668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.083924][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.091644][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.099194][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.108866][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.117134][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.124472][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.134357][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.142639][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.149661][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.162984][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.172847][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.187573][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.199972][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.208480][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.216079][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.224987][ T7668] device veth0_vlan entered promiscuous mode [ 230.236348][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.245755][ T7668] device veth1_macvtap entered promiscuous mode [ 230.256051][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.266344][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.112772][ T316] device bridge_slave_1 left promiscuous mode [ 231.118924][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.127060][ T316] device bridge_slave_0 left promiscuous mode [ 231.133318][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.141311][ T316] device veth1_macvtap left promiscuous mode [ 231.147372][ T316] device veth0_vlan left promiscuous mode [ 231.699193][ T7673] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.706780][ T7673] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.714306][ T7673] device bridge_slave_0 entered promiscuous mode [ 231.721314][ T7673] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.728394][ T7673] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.735819][ T7673] device bridge_slave_1 entered promiscuous mode [ 231.784070][ T7673] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.791215][ T7673] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.798633][ T7673] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.805815][ T7673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.829159][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.836572][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.844238][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.851697][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.861257][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.869553][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.876827][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.886549][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.894983][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.902000][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.915138][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.924621][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.939862][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.951803][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.960244][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.968201][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.977584][ T7673] device veth0_vlan entered promiscuous mode [ 231.988629][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.998273][ T7673] device veth1_macvtap entered promiscuous mode [ 232.008302][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.018751][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.953138][ T10] device bridge_slave_1 left promiscuous mode [ 232.959396][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.966952][ T10] device bridge_slave_0 left promiscuous mode [ 232.973153][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.981331][ T10] device veth1_macvtap left promiscuous mode [ 232.987397][ T10] device veth0_vlan left promiscuous mode [ 233.577130][ T7678] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.584327][ T7678] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.591843][ T7678] device bridge_slave_0 entered promiscuous mode [ 233.599167][ T7678] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.606243][ T7678] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.613672][ T7678] device bridge_slave_1 entered promiscuous mode [ 233.662361][ T7678] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.669403][ T7678] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.676769][ T7678] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.683902][ T7678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.705402][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.713103][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.720422][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.729750][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.738143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.746462][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.753614][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.763971][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.772725][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.781009][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.788123][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.800573][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.809121][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.818613][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.827241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.842016][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 233.850712][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 233.862811][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 233.870762][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.879258][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.886901][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.895591][ T7678] device veth0_vlan entered promiscuous mode [ 233.905915][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.914221][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.924166][ T7678] device veth1_macvtap entered promiscuous mode [ 233.934352][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.942298][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 233.950705][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 233.960727][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.969299][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.953342][ T316] device bridge_slave_1 left promiscuous mode [ 234.959515][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.967142][ T316] device bridge_slave_0 left promiscuous mode [ 234.973350][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.981326][ T316] device veth1_macvtap left promiscuous mode [ 234.987551][ T316] device veth0_vlan left promiscuous mode [ 235.650093][ T7683] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.657163][ T7683] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.664626][ T7683] device bridge_slave_0 entered promiscuous mode [ 235.671494][ T7683] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.678839][ T7683] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.686331][ T7683] device bridge_slave_1 entered promiscuous mode [ 235.733900][ T7683] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.740938][ T7683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.748248][ T7683] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.755292][ T7683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.776050][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.784062][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.791403][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.800938][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.809457][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.817870][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.824991][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.834036][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.842494][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.850663][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.857709][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.869781][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.877996][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.887311][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.895770][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.909990][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 235.918597][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.930032][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 235.938249][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.946379][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.954151][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.962683][ T7683] device veth0_vlan entered promiscuous mode [ 235.973092][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.981295][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.990938][ T7683] device veth1_macvtap entered promiscuous mode [ 236.001167][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 236.008960][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.017459][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.027017][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.035342][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 237.032890][ T316] device bridge_slave_1 left promiscuous mode [ 237.039015][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.046555][ T316] device bridge_slave_0 left promiscuous mode [ 237.052751][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.060664][ T316] device veth1_macvtap left promiscuous mode [ 237.066806][ T316] device veth0_vlan left promiscuous mode [ 237.798506][ T7688] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.805807][ T7688] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.813318][ T7688] device bridge_slave_0 entered promiscuous mode [ 237.820254][ T7688] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.827373][ T7688] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.834949][ T7688] device bridge_slave_1 entered promiscuous mode [ 237.883334][ T7688] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.890481][ T7688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.897798][ T7688] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.904851][ T7688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.912893][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.920242][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.941344][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.948893][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.958371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.966886][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.975117][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.982157][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.991066][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.999565][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.007889][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.014939][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.026926][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.035150][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.044329][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.052783][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.067319][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.075909][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.088054][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.096975][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.105286][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.113024][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.121345][ T7688] device veth0_vlan entered promiscuous mode [ 238.131587][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.139861][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.149602][ T7688] device veth1_macvtap entered promiscuous mode [ 238.159521][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.167518][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.176068][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.185680][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.194002][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.303081][ T316] device bridge_slave_1 left promiscuous mode [ 239.309655][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.317431][ T316] device bridge_slave_0 left promiscuous mode [ 239.323696][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.331921][ T316] device veth1_macvtap left promiscuous mode [ 239.338126][ T316] device veth0_vlan left promiscuous mode [ 240.039779][ T7693] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.046873][ T7693] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.054355][ T7693] device bridge_slave_0 entered promiscuous mode [ 240.061541][ T7693] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.068685][ T7693] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.076098][ T7693] device bridge_slave_1 entered promiscuous mode [ 240.123115][ T7693] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.130155][ T7693] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.137553][ T7693] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.144596][ T7693] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.166022][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.173765][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.181072][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.190621][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.198839][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.205885][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.214967][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.223222][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.230363][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.243611][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.253456][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.268609][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.280745][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.288983][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.296464][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.305031][ T7693] device veth0_vlan entered promiscuous mode [ 240.316732][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.325974][ T7693] device veth1_macvtap entered promiscuous mode [ 240.335865][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.346270][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.273170][ T316] device bridge_slave_1 left promiscuous mode [ 241.279319][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.286889][ T316] device bridge_slave_0 left promiscuous mode [ 241.293132][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.301201][ T316] device veth1_macvtap left promiscuous mode [ 241.307268][ T316] device veth0_vlan left promiscuous mode [ 242.324713][ T7698] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.331753][ T7698] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.339309][ T7698] device bridge_slave_0 entered promiscuous mode [ 242.346394][ T7698] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.353523][ T7698] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.360936][ T7698] device bridge_slave_1 entered promiscuous mode [ 242.407848][ T7698] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.414913][ T7698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.422436][ T7698] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.429524][ T7698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.450273][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.457971][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.465325][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.475769][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.484133][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.491150][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.500048][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.508455][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.515509][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.529436][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.538807][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.553785][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.565854][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.574185][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.581850][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.590936][ T7698] device veth0_vlan entered promiscuous mode [ 242.601723][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.611719][ T7698] device veth1_macvtap entered promiscuous mode [ 242.621818][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.633116][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.512931][ T316] device bridge_slave_1 left promiscuous mode [ 243.519087][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.526639][ T316] device bridge_slave_0 left promiscuous mode [ 243.533038][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.541007][ T316] device veth1_macvtap left promiscuous mode [ 243.547139][ T316] device veth0_vlan left promiscuous mode [ 244.700181][ T7703] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.707311][ T7703] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.714774][ T7703] device bridge_slave_0 entered promiscuous mode [ 244.721684][ T7703] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.728891][ T7703] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.736386][ T7703] device bridge_slave_1 entered promiscuous mode [ 244.784038][ T7703] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.791179][ T7703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.798479][ T7703] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.805632][ T7703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.826696][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.834594][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.841923][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.851491][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.859757][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.866818][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.875914][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.884221][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.891247][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.904487][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.914078][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 244.929249][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 244.941120][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.950006][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.957795][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.966539][ T7703] device veth0_vlan entered promiscuous mode [ 244.977528][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.986928][ T7703] device veth1_macvtap entered promiscuous mode [ 244.996946][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 245.007419][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.872684][ T10] device bridge_slave_1 left promiscuous mode [ 245.878845][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.886454][ T10] device bridge_slave_0 left promiscuous mode [ 245.892673][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.900488][ T10] device veth1_macvtap left promiscuous mode [ 245.906564][ T10] device veth0_vlan left promiscuous mode [ 247.158939][ T7708] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.166177][ T7708] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.173729][ T7708] device bridge_slave_0 entered promiscuous mode [ 247.180621][ T7708] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.187727][ T7708] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.195154][ T7708] device bridge_slave_1 entered promiscuous mode [ 247.246302][ T7708] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.253399][ T7708] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.260674][ T7708] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.267742][ T7708] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.288706][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.295981][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.303627][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.311274][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.320609][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.328804][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.335864][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.345114][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.353382][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.360415][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.373592][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.384040][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.398868][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.410599][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.418952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.426520][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.435577][ T7708] device veth0_vlan entered promiscuous mode [ 247.446328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.455687][ T7708] device veth1_macvtap entered promiscuous mode [ 247.465655][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.475836][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=2262 state=3 status=67 (errno 9: Bad file descriptor) [ 247.570043][ T30] audit: type=1400 audit(1747477357.454:167): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14532]" dev="pipefs" ino=14532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 248.313777][ T10] device bridge_slave_1 left promiscuous mode [ 248.319908][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.327491][ T10] device bridge_slave_0 left promiscuous mode [ 248.333707][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.341647][ T10] device veth1_macvtap left promiscuous mode [ 248.347945][ T10] device veth0_vlan left promiscuous mode [ 249.513320][ T10] GPL: port 1(erspan0) entered disabled state [ 249.520093][ T10] GPL: port 1(erspan0) entered disabled state [ 249.527989][ T10] device erspan0 left promiscuous mode [ 249.533537][ T10] GPL: port 1(erspan0) entered disabled state [ 249.541233][ T10] device erspan0 left promiscuous mode [ 249.546741][ T10] GPL: port 1(erspan0) entered disabled state [ 249.915059][ T10] device veth1 left promiscuous mode [ 249.920432][ T10] ˙˙˙˙ge0: port 1(veth1) entered disabled state [ 249.928869][ T10] device veth1_macvtap left promiscuous mode [ 249.935533][ T10] device veth1_macvtap left promiscuous mode