last executing test programs: 19.519515338s ago: executing program 2 (id=15537): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000020000b16600000018110000b127209429bea213ffa0ea467ff3a49871fd36c9c10f1057e222e5499ab21e635e29d12505", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r1, &(0x7f0000002c80)={&(0x7f0000000180)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002bc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x41}, @remote}}}], 0x20}, 0x20000004) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803003f000b12d25a80648c2594f90124fc60020c02", 0x17}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x3, 0x10) r5 = socket$kcm(0x2, 0x2, 0x73) setsockopt$sock_attach_bpf(r5, 0x0, 0x29, 0x0, 0x17) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x703, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030010000b0fd25a806c8c6f94f90a24fc60", 0x33fe0}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r6, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f00000004c0)='\xbaX\x1a\x10\xc4\xe5\x94\xf9\xd5\x11\xbc:{\x12j\xb4\xfe:\x8d\x9a$5\xb6O\x896\x1cqx\xe0\x1b<\x96\x90\x02[\xb3\xe6\"Z\xf1\x89\x96\x90\xf4eG\xd7\xba\xeb\x8a\xac\xbf\x18^\xcd\xd0\xdb\xca\x87\xd9\xc0r;\v\x7f&\xf8\v\n\xe7\x95\xe7\xa0\x90\xa2\n\x12\xd0\xde\xa2\xb0X\x13\x1ft\x87\\z\x96\x9c\x89\xebjE\xc7\xfa\xc1\xa4\xfb\x97\x90\x99\x8eV\xc1\x854\xdd\b\x83D\x91eQ8\xd5\x04\xce\t\x8b_1:+\n}\xd4\x97,\a^\x12Ff\xbd\xd8\xda\x86;\xedD\x90q.\xe59&X{\x90\xf9E\xe4\xe5\x19\xfcGq\x86\xa8\xd9~\v\x82\xf2\xf8T\b`%\xf6kF\x9d\xb7\xb5\xafe\x1f+\"\x14\xb4h\x95(s\xdd\xfb\xe2\x8e\xc6\xd59?Rz\xcar\x94\xb2oj\xe2\xe3<\xa8]F9Q`r\v\xd9Q\x8f%\x9a\b\x00mv\xf7rC\x8a=\x98\xbf\x8a\xcb{\x9bVc\x83\xa5t9\xfc\xc8by}\xf2V\xf8)\x80^\x88Q\xb9\x00\xe8 j\x98\xfd\xca\xa9\x86k\xf8\x11\x94\x01<\xfao\xe9\xee\xbc\xebL\x12cD\\\x03\xaa\x93\x18\xf2\xbf\x85\xd5n\n,\xcfGg\xeb\x12\xe9\xf0\b\xd26\xe3\xbb\xe9\xd8A5#C\x1e[\x13\x9f\xb1') bpf$ENABLE_STATS(0x20, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000180000003b2d58fa0e8ae152", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r10, 0x800454e0, &(0x7f0000000100)=r12) 19.14354511s ago: executing program 2 (id=15538): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000900)}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x1, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x204}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x106) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x894b, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c002, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12986, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x8008851) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r4}, 0xc) socket$kcm(0xa, 0x7, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1c000000210081044e81f782db44b9040200000000806c0100001500", 0x1c}], 0x1}, 0x0) 18.614548463s ago: executing program 2 (id=15546): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700000004000000000900000100000028"], 0x50) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e", 0x19}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c23003f) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x10021, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4d, 0xe67}, 0x11080, 0xffffffffffffffff, 0x3, 0x9, 0xa17c, 0x40ff, 0x5, 0x0, 0xd, 0x0, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000002b00)) ioctl$SIOCSIFHWADDR(r3, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @broadcast}) r4 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x29, 0x1f, &(0x7f0000000040), 0xcf) write$cgroup_devices(r1, 0x0, 0xa) sendmsg$kcm(r1, &(0x7f0000002ac0)={&(0x7f0000001100)=@ieee802154={0x24, @short={0x2, 0xffff}}, 0x80, &(0x7f0000002780)=[{0x0}], 0x1}, 0x4000) socket$kcm(0xa, 0x7, 0x73) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)}, 0x40000) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000007000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r6}, 0xc) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r0, 0x58, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a00)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000040000000b0000000000000a000000000e0000000000000a05000000030000000000000801000000100000000000000c050000000f00000000000010080000000600000002000005090000000900000004000000ff0300000500000005000000030000000061000046c773d010e2494154b655048ee967019563cca98534b8aa2dbc30877eb109549cca846b6bfec9417abccb40098f790000df4ea9b28e1041262c963ef280d2088065eeedbea103553f6a72753ab08f2f0c6fbc00a6aa10ad09a65fe1f4fa88b2b96075f83cfbb8f1bc70fca126d8ca0e"], &(0x7f0000000900)=""/240, 0x7c, 0xf0, 0x0, 0xffffffff}, 0x28) r9 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x1020, 0x0, 0x8, 0x0, 0x4000004, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYRES16=r8], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x20, 0x0, &(0x7f00000002c0)="b90103616908068c3c270040e700009e0dc5cf1d66fff2fcffff8100632f2991", 0x0, 0x8104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 15.331684471s ago: executing program 2 (id=15552): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc03e}, 0x0) 15.234482913s ago: executing program 2 (id=15553): perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x6, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="18020000ff0300000000000000000000850000004100000085000000d000000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000280)="a8fe50ae30a3da8f990ed54d42a5", 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) recvmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff2300000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010404000011000000b7030000000000006a0a00fe000000008500000032000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000cb450063dedba767ade51f7f1f66acd19100002000000000000000ff7f0000b52f17cee19d0001000000000000000000cb04fcbb4e4d0b9bafe3ba431351a58a885ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e85cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b83b994fc4051ade12f41deff6df6a936b4ec3827c739bb39aad16cc75fe369258673b5df11cc2afb53611cc32a790bc0b80e80eae8f5e64be2c9d2d29db3d36dd0cf8f79a015c7bd3f15aa6aadbeab2a01685108e61aa00000000000000000000000000c67c6c6a06e828e5216f601b19db1af1b5d356d0f062137d866d11be4ba3f0151fdbbd4e97d62ecc645e143a60f10800000000000000826151e3b42bcae95239ef5ca2a730a00c87c493db0300e63fda97a296820000000001000000eecc952a3fd2c46f3c1cde71a19d1a2982492a210e00d2bfea3b8d188df2eff8d56aaae7d32a2e180022537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f225992dbdd5bb01ba51508951c7a7d6ca0916c3a12912715649c2b1c7192a4251b59d378d3f00000000000000665c8b7e89eddfc3783f6c9129a7c5f8ee5f50579e2f638f7eb12f63be72a3d81ab324d6e417b1c2cbfdcada0a16e31790e26cf19588a7e0496ee2782224cf30f810da86cf1a3204f4c9404f5d7321a4fefc4d1c9139ca4b65b99909950000006b42077ca60fdecb2717e21f8f187b1866108b6e8c71e2603217606637ece1fa89917e131f4034a8383e99c3568fd04201b37cd92ca6ebf94a2d8310f7032775cfd75652f87b039d5430b3c6643e9146d2478ce31344b554aca7670000000000000010c65608fda6ed5d08e7a796042aa127d874105787d0347aa37801faff5b9050803a19ff6205aa5c263e407a2f7de56f7a0000e094fa4e3f05528caab5a430c08dd810bc97204b767dd969721a26aa740000000000bc433fe2d0a6ef2a8a91cd3cb305aa80dadef8b0caca780000000000000000863e21db415a222bb1a7ab94bfe4a74157d794f9d0430c2c0eb563350559829865a3dd08fb31bd0801e09aa3ee45e61a56fc83076451cff7632e49a41eadb5044a0d5f73d6932161ae5e9ce218a35cd8e7b747887b1a74798982d0b492c3f0ff53189d80733eb04f8124877b648ff438f7d66c7efcc09a8f3330b6c22d14e80db8e5608bdeab9388b758a15f4ce70390c214bc6838798f5b9b0b500d4e8b5174f329b8501c6feb7a6982bcea74a0f2ced7fa2059234a8d10b7f0597151d5c9067d57d85f4ae933eaf5174ba122f3f702ef8695578d3c08562c9fc185f0f65d11b4c58ae52500cbe99cde3758a5cbe6093dd328ac820e2de309d25a324647aadffcecf0f3bbaeda7af4436d9ffbce1b240a2f5e346eba8812e6329e01b087bde7da4a6448f478102e90c8134f531de08d4cf4f6f35b15a202544c0ced0c1715fd3a90099f785a13a2412bedba2981dd22bd9d736c00000000000000000000000000000000eb6fec8d7d2f77f4d470a9caa5b1bfc00cd1d40830ac35f229f8ffe1c02a63d3c2d9"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(r5, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x41, &(0x7f0000000040)=r7, 0x4) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x4d10}) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r4, &(0x7f00000000c0)="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"}, 0x20) 15.085036965s ago: executing program 2 (id=15555): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000040)={'macvtap0\x00', @random='\x00\x00\x00\x00\x00 '}) (fail_nth: 8) 5.239365081s ago: executing program 4 (id=15592): socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x28, 0x0, 0x0, 0x5d31, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, 0x0, 0x1a, 0x0, 0x1, 0x8}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0500000002000000070000000200000001090000", @ANYRES32, @ANYBLOB="740e00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001380)={r0, r0, 0x4, r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x14, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x108278, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000180)={0x2, 0xebff, @dev}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000540)="83ac6f4b9a2ffa25922fee4db5d86075d796", 0x12}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001700)={r0, 0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x3, 0x0, 0xd00, 0x0, &(0x7f0000000680)="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", &(0x7f0000001680), 0x1, 0x0, 0x3}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000200)={'wg0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x26}}) write$cgroup_pid(r0, &(0x7f00000002c0), 0x12) socketpair(0x26, 0x800, 0xc0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r3}, 0x8) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0xff, 0x0, 0x8, 0x0, 0x9, 0x2001, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4000000, 0x800000000000}, 0x4204, 0x200, 0x0, 0x0, 0x9, 0xffffffff, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r6) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f0000000280)={'wlan0\x00', @multicast}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f00000013c0)=ANY=[@ANYBLOB="b405000000000000611078000000000007000000000000009500000000000000acad2951ffc66a73c37f1239b973607adde3aeee12a6182bd218c92e5bdc2c6b29dc026a3cfeb3c6dcbec2a8f174d4f47861d79f21abe2185fe85e459606e0e752530ec044b33c9a9a860d0ec6369408b82aa922d9d0314ad588fadbbbd9ab1b62c0b2b650bdf1bc4ecf1437cff1a99afc9d630e53657dcfa2cd319781521e8ab36a32e07eecc70d82daecde34f155"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000000e21000000000000000000850000004100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x4e}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) openat$cgroup_procs(r6, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) 5.082622292s ago: executing program 0 (id=15595): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f0000000380)="9e95e125f33f5779c3841ad20f0b8946ae6b6947344a3e02deb521e6dd93e980c3f1f9605d67f0660d82a233aa2fd950f0bb539eb860f980a4db36619fe20172a39d361658cb75984b477f13e9e2dcc28601b871148d8f0a71c714d0efd572aefc3ee167aed66bc60a92d6c9d69ca9365cfef03925ffe1e58c5e61894e95844d1d95f4cd64f3e6cf2938488c1c29444c698e2e83d2434e6d8eb717cf6487037979653b4645", &(0x7f0000001d00)=""/4096, &(0x7f00000000c0)="87a9ef4c25d2f4f8a0d9a4777351899fcd36a63b459eec59d34ad7f6a8cf5585f009db9f3135a17510e3b2b3aebda0b8bc6ea30cc13f4d6aa64bf025faf7b8a2f74e7a8d12f5d815c26f6b3bf325561f9ad46703b6e5fb5a9399f727ac3b55abf4243d958134be0afca80eb0b6e03cfe30d0", &(0x7f00000002c0)="9895f066b27d68fbeb678c795b806c05ea2db9aff08e00fff88110e0b95bca3ea75a2b1f59cd759fb686343b4d897891b78e6a07b71f0de3aef0b958274a047e9343d4364162f0f74622ae3e806f958dd6c6078a6f279f", 0x7, r0}, 0x38) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="180000003d000b08d25a80648c7494f90324fc600b000240", 0x18}], 0x1}, 0x24000000) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000200)=r4, 0x4) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) r7 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0xe, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a2, &(0x7f0000000080)) sendmsg$inet(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000a00)="f6722136b99013d966cd8e6bff5536427462fa0b4358061230f6a09ef364cdafba8f162723ad75bcf39b32b179c19ec60b8bf9134e8ebd6a9b3cc6f46d63c98137ed5a7cd8f096009b83fc7198a8fce44f4a423f136f88193152fcf83e7a942f6b48914bf342f17d00475512c088b0c5b6eb71c04de4a6c65e840e22c10a40959a2b5f", 0x83}, {&(0x7f00000006c0)="c2cf8ad34b1b6fad650d9dde801e6f7787605f38ef4c734eb5d4c3cb2dbf09ac8c45fe7f0b91bed58ee4b845ccee2f6cd044ced254e87e6a183f4523c8647741555fa795a05382a5b419e15058d7fdd4c39de18f3fdf141931354e1f674ef6e5f7bdb991cdce7ade6077f43d0f33a82617", 0x71}], 0x2, &(0x7f0000000bc0)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@cipso={0x86, 0x28, 0x3, [{0x5, 0x12, "ea4cf9b89b47b05213c69f1a0102d764"}, {0x0, 0x10, "a16b558d3443e9d37103fe5e0f12"}]}, @generic={0x7, 0xe, "e1f531524fcdd70cc554e01f"}, @lsrr={0x83, 0xb, 0x6e, [@loopback, @broadcast]}, @rr={0x7, 0x7, 0x4a, [@dev={0xac, 0x14, 0x14, 0x37}]}, @generic={0x86, 0xd, "59c1b2351ac765e76e8e7c"}, @ra={0x94, 0x4}, @timestamp={0x44, 0x20, 0xad, 0x0, 0x3, [0x6, 0x6, 0x4, 0x3, 0x8, 0x5, 0x7fff]}, @timestamp={0x44, 0x28, 0xce, 0x0, 0x1, [0xc49, 0x6, 0x8001, 0x0, 0x0, 0x3, 0x2bd9, 0x9, 0xb]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x100}, 0x4000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r10 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r10, 0x107, 0xc, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 5.080731901s ago: executing program 4 (id=15596): r0 = socket$kcm(0x11, 0x2, 0x0) close(r0) r1 = socket$kcm(0x11, 0x2, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x8) r3 = socket$kcm(0x11, 0x2, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000050000006cff57"], 0x48) setsockopt$sock_attach_bpf(r3, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x8) socket$kcm(0x11, 0xa, 0x300) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce220010"], 0xcfa4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12000) sendmsg$inet(0xffffffffffffffff, 0x0, 0x3000c085) socket$kcm(0xa, 0x1, 0x106) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd63"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 4.991827915s ago: executing program 1 (id=15597): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x541b, &(0x7f0000000340)={'veth0_virt_wifi\x00', @remote}) 4.915495161s ago: executing program 1 (id=15598): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x55}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000000)="76ea090000000000009ba56a8864", 0x0, 0xff, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x5, 0x14, 0x0, &(0x7f0000000000)='%', 0x0, 0x7fffffff, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 3.340834753s ago: executing program 0 (id=15599): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x3, @remote, 0x5, 0x3}, 0x80, 0x0}, 0x2600c055) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000e200000000611118"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="020b0700fc670000e4a17c45c8d260c9", 0x33fe0}], 0x1}, 0x0) 2.078057971s ago: executing program 1 (id=15600): bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup, 0x36, 0x1, 0x4a, 0x0, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000100), 0x0}, 0x40) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x107806, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8, 0x0, 0x39}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r5) r6 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r6, 0x0, 0x2000488c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="6880a642beaf34317f0dd3122a90ad0d2b", 0x11}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r7, &(0x7f0000000540)={0x0, 0xc027, &(0x7f0000000340)=[{&(0x7f00000000c0)="97eb000014006bcd9e", 0xeb97}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000038000511d25a80698c63940d0124fc602f6e35400c000200001ec00037153e370a00018025640000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x39c}, 0x0) sendmsg$inet(r4, &(0x7f0000000400)={&(0x7f0000000240)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)="e3a751baac9c09cde910135843fb078f0ed2ab208b597d3698d403082d64cfe9da7875e37b832fc48c2d2171ddb7490a3f27e0fd1730bf453f0ad17358be4b60045ecd77ca08ec6478c67cd86b3fdfde", 0x50}, {&(0x7f0000000300)="6a131e07bb2fbb4e91fa1902f62d6717007ff4df88842a9687ff8faf33c5e3560e927d3233bbe698cfbf42b4f2771869e6c9d9c3f49fdb4dda0884b6716adf6294ac08d1affc093291cfd0ca95a0d0b6bfa26ec70ec842f029d0", 0x5a}, {&(0x7f00000005c0)="f57ae8756c3bf1714e4281405c60760477760520260472bbc30d9e9a4533520d4d1cf022f0f553dced90a6178f43e22437be7474625a6c096766a68be3e4331369aa512db85b70544d0704e29d01a5180fba1c1d45d3b078b79b54409316638bdd99e0fa565fcd30b3f0cf7ab989fc088372b2899f262d1a6afc1942dbc330aff7722b94709a01572b2caaedcf26a570203aced0f964d66b839aca215acfdcb5821f996b1e077cec7e19ee815c180a420cf189e78e0321cdd0444136eacdb461ee3a63ab4082b92be78fbe2b99930b1445452f5cb3655e8e45ce101973d78e105021f367f66ac9d80f2c829613a3d57e0e4b20bd", 0xf4}], 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="1100000000000000000000000100000008000000000000001c000000000000000000000007000000890be70000000000000000000000000090000000000000000000000007000000892b0f7f000001f7ffffffe00000027f00000100000000ac1414bb640101000a010100e00000020a010102442409710000000000000004e0000001000000017f000001000000077f00000100000002940818190dd7def7009404010000891bfee0000002ac1414bbe0000002ac1e00010a010102ac14140f8307cdac1414bb0014000000000000000000000002000000feffffff002de700"], 0xe0}, 0x400d4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) sendmsg$inet(r3, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ff, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0xc}, 0x8000, 0x0, 0x80000, 0x1, 0x0, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r2, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x20) r9 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r9, 0x1, 0x41, &(0x7f0000000040)=r8, 0x4) 2.005563678s ago: executing program 4 (id=15601): socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, 0x0, 0xc0}, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x3, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 1.993672736s ago: executing program 0 (id=15602): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x3500000000000000) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x2, 0x2) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000003c0)="d80000001d0081054e81f783db4cb9040a00000000000000e8fc3ca10a0015000600142603600e1208000f0000000401a80001000047880000000000035c0461c1d67f6f94007134cf6efb8000feea60d8a8a007a290457f0189b316277ce06bbaceac3c2fb14c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775820d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809", 0xa2}], 0x1}, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012000000000000000000"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x3, 0x5, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x0, 0x0, 0x9, 0x0, 0x7, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x23, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89ed, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)}, 0x120) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x6d, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed009875f37538e486dd0000000003"], 0xfe1b) recvmsg(r2, &(0x7f0000003e40)={0x0, 0x0, &(0x7f0000003d40)=[{&(0x7f0000000a00)=""/118, 0x76}, {&(0x7f0000000a80)=""/156, 0x9c}, {&(0x7f00000001c0)=""/43, 0x2b}, {&(0x7f0000000b40)=""/167, 0xa7}, {&(0x7f0000000c00)=""/23, 0x17}, {&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/149, 0x95}], 0x8, &(0x7f0000003e00)=""/3, 0x3}, 0x0) r3 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r3, &(0x7f00000037c0)=ANY=[@ANYBLOB="1c0000005f00071b189da80400008000000000af1f"], 0xfe33) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) recvmsg(r2, &(0x7f00000009c0)={&(0x7f0000000240)=@isdn, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f00000002c0)=""/166, 0xa6}, {&(0x7f00000003c0)=""/171, 0xab}, {&(0x7f0000000600)=""/68, 0x44}, {&(0x7f0000000680)=""/173, 0xad}, {&(0x7f0000000740)=""/210, 0xd2}, {&(0x7f0000000840)=""/194, 0xc2}], 0x7, &(0x7f00000001c0)}, 0x400000a6) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) 1.96091061s ago: executing program 3 (id=15603): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1faa00000000000071101e000000000095000000000000002020e4bd8503f8ab2215f80bc72d5b764d019741c507000000920a5fea5629126f02f22fbe444467069b956e57cdd4b3434573eae5fb148b55fe50ecc9bb6eecf85aab6369a66c"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) 1.839695657s ago: executing program 4 (id=15604): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000500)="d80000001a0081044e81f782db4cb9041c1d0800fe007c05e88368002c0001000002000000000000080005007a010401a80016002000034004020000035c0461c9d67f4f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2fe547dc84e838d60d871355bc9aaaf02b6a24865233018053e44bdf0e1555b1fd796573deefe439c5e0c780a2580fab2d48a2eb84a0134f9c6953c734df45c1e7f8b41163118bcd6110e3580f47b959d5f2a2d4485d03c6765589e078e68722e43dfa90dd246f394e266763696a", 0xd8}], 0x1}, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x55}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000000)="76ea090000000000009ba56a8864", 0x0, 0xff, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r2, 0x5, 0x14, 0x0, &(0x7f0000000000)='%', 0x0, 0x7fffffff, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 1.836138237s ago: executing program 3 (id=15605): r0 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)="d80000001e0081054e81f78206000000000000000a0014260360cf9808000f00245bde1625fcb8b20800094014000000035c0461c1d67f6f94007134cf6efb8000d74748420a963aa007a290457f01898102e807ad522a4807f13af8030ab316277ce07bbace8017cbec4c2ee5a7cef4090000001fb791433a5ee4ce1b14d6d930dfe1d9d322fe7c9f8716a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad909d5e1ca9781ed0bffece0b42a9eca0200e6d5d40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x40800) r4 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc909}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000002c0)="5c00000014006b03000000d86e6c1d00028440fcffff564500004e23e3f58e76110165f450e71b0075e3002500028d459e37000f0000000000bf9367b47e51f60a64c9f4d4938037e786a6d0bdd700"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f0000001000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x2, 0x20010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8, 0x800000000000, 0x39}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001100)={r3}) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @multicast}) r7 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r7, 0x0, 0x2000488c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="6880a642beaf34317f0dd3122a90ad0d2b", 0x11}], 0x1}, 0x40000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001140)={r0}) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x6, 0x5, &(0x7f0000000040)) 1.815887073s ago: executing program 1 (id=15606): socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x28, 0x0, 0x0, 0x5d31, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, 0x0, 0x1a, 0x0, 0x1, 0x8}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0500000002000000070000000200000001090000", @ANYRES32, @ANYBLOB="740e00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001380)={r0, r0, 0x4, r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x14, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x108278, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000180)={0x2, 0xebff, @dev}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000540)="83ac6f4b9a2ffa25922fee4db5d86075d796", 0x12}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001700)={r0, 0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x3, 0x0, 0xd00, 0x0, &(0x7f0000000680)="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", &(0x7f0000001680), 0x1, 0x0, 0x3}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000200)={'wg0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x26}}) write$cgroup_pid(r0, &(0x7f00000002c0), 0x12) socketpair(0x26, 0x800, 0xc0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r3}, 0x8) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0xff, 0x0, 0x8, 0x0, 0x9, 0x2001, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4000000, 0x800000000000}, 0x4204, 0x200, 0x0, 0x0, 0x9, 0xffffffff, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r6) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f0000000280)={'wlan0\x00', @multicast}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f00000013c0)=ANY=[@ANYBLOB="b405000000000000611078000000000007000000000000009500000000000000acad2951ffc66a73c37f1239b973607adde3aeee12a6182bd218c92e5bdc2c6b29dc026a3cfeb3c6dcbec2a8f174d4f47861d79f21abe2185fe85e459606e0e752530ec044b33c9a9a860d0ec6369408b82aa922d9d0314ad588fadbbbd9ab1b62c0b2b650bdf1bc4ecf1437cff1a99afc9d630e53657dcfa2cd319781521e8ab36a32e07eecc70d82daecde34f155"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000000e21000000000000000000850000004100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x4e}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) openat$cgroup_procs(r6, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) 1.759291483s ago: executing program 0 (id=15607): perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x2, 0x4000002, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x21, 0x2, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f00000008c0), 0x12) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r4 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r3}, 0x8) close(r4) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d00)={r0, 0x20, &(0x7f0000000cc0)={&(0x7f0000000b40)=""/134, 0x86, 0x0, &(0x7f0000000c00)=""/152, 0x98}}, 0x10) 827.766872ms ago: executing program 4 (id=15608): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x541b, &(0x7f0000000340)={'veth0_virt_wifi\x00', @remote}) 813.376759ms ago: executing program 1 (id=15609): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f0000000380)="9e95e125f33f5779c3841ad20f0b8946ae6b6947344a3e02deb521e6dd93e980c3f1f9605d67f0660d82a233aa2fd950f0bb539eb860f980a4db36619fe20172a39d361658cb75984b477f13e9e2dcc28601b871148d8f0a71c714d0efd572aefc3ee167aed66bc60a92d6c9d69ca9365cfef03925ffe1e58c5e61894e95844d1d95f4cd64f3e6cf2938488c1c29444c698e2e83d2434e6d8eb717cf6487037979653b4645", &(0x7f0000001d00)=""/4096, &(0x7f00000000c0)="87a9ef4c25d2f4f8a0d9a4777351899fcd36a63b459eec59d34ad7f6a8cf5585f009db9f3135a17510e3b2b3aebda0b8bc6ea30cc13f4d6aa64bf025faf7b8a2f74e7a8d12f5d815c26f6b3bf325561f9ad46703b6e5fb5a9399f727ac3b55abf4243d958134be0afca80eb0b6e03cfe30d0", &(0x7f00000002c0)="9895f066b27d68fbeb678c795b806c05ea2db9aff08e00fff88110e0b95bca3ea75a2b1f59cd759fb686343b4d897891b78e6a07b71f0de3aef0b958274a047e9343d4364162f0f74622ae3e806f958dd6c6078a6f279f", 0x7, r0}, 0x38) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="180000003d000b08d25a80648c7494f90324fc600b000240", 0x18}], 0x1}, 0x24000000) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, 0x0, &(0x7f00000001c0)}, 0x20) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000200)=r4, 0x4) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) r7 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0xe, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a2, &(0x7f0000000080)) sendmsg$inet(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000a00)="f6722136b99013d966cd8e6bff5536427462fa0b4358061230f6a09ef364cdafba8f162723ad75bcf39b32b179c19ec60b8bf9134e8ebd6a9b3cc6f46d63c98137ed5a7cd8f096009b83fc7198a8fce44f4a423f136f88193152fcf83e7a942f6b48914bf342f17d00475512c088b0c5b6eb71c04de4a6c65e840e22c10a40959a2b5f", 0x83}, {&(0x7f00000006c0)="c2cf8ad34b1b6fad650d9dde801e6f7787605f38ef4c734eb5d4c3cb2dbf09ac8c45fe7f0b91bed58ee4b845ccee2f6cd044ced254e87e6a183f4523c8647741555fa795a05382a5b419e15058d7fdd4c39de18f3fdf141931354e1f674ef6e5f7bdb991cdce7ade6077f43d0f33a82617", 0x71}], 0x2, &(0x7f0000000bc0)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@cipso={0x86, 0x28, 0x3, [{0x5, 0x12, "ea4cf9b89b47b05213c69f1a0102d764"}, {0x0, 0x10, "a16b558d3443e9d37103fe5e0f12"}]}, @generic={0x7, 0xe, "e1f531524fcdd70cc554e01f"}, @lsrr={0x83, 0xb, 0x6e, [@loopback, @broadcast]}, @rr={0x7, 0x7, 0x4a, [@dev={0xac, 0x14, 0x14, 0x37}]}, @generic={0x86, 0xd, "59c1b2351ac765e76e8e7c"}, @ra={0x94, 0x4}, @timestamp={0x44, 0x20, 0xad, 0x0, 0x3, [0x6, 0x6, 0x4, 0x3, 0x8, 0x5, 0x7fff]}, @timestamp={0x44, 0x28, 0xce, 0x0, 0x1, [0xc49, 0x6, 0x8001, 0x0, 0x0, 0x3, 0x2bd9, 0x9, 0xb]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x100}, 0x4000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r10 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r10, 0x107, 0xc, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 770.762562ms ago: executing program 0 (id=15610): socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0600000004000000040000000600000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000086a74ba0cbeb9c33af00b6a4871373e3c575dc125ca0d612b628b6c67c0d5c8a15652a3cea8d2f139f62510a87a5d7f0a935f8a91adcb13a1db0cf6342a4f8e33ae7b487b9d18309615024aa76bc7d94767166ea36270efd567cb39b785a54474b3a09c3c05a46b1c3f453f2e5651631eb77d8ffa3d24f38bf1cbad4e52d78c44531fe99a790", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x28, &(0x7f0000000000), 0x4) recvmsg(r1, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x8403, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000, 0x0, 0xfffffffc, 0x1, 0x0, 0x0, 0x5, 0x0, 0x78}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r2, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @dev}}, 0x8c, &(0x7f0000000140)=[{&(0x7f0000000ac0)="ee", 0xfffffdef}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b57000000860f5878c37ffe36e1165814d435be5b317c6c8189587d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988ab013f40afe403041323110f62055394412158e7a3adb148d641aa40d4ab077fe34232aa8b31851466d0998a61d7da0c86d70000001010"], 0x10b8}, 0xff00) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x4, 0x8000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x48060) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x40040) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff229, 0x1, @perf_config_ext={0x80000001, 0x1}, 0x8041, 0x7, 0x0, 0x0, 0x0, 0x7, 0x200, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) r4 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0xf, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000040)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x12}, 0x80, &(0x7f0000000140)=[{&(0x7f00000006c0)="62043c009e0101000001ad2f1eafbcf706e12b30087f5c582d26116642c47a5f8786ee601e65ab3c06d4b8bf4a81cb3e247345af215542f41ddf82f618438a34f90186cee8441e2305e495d04ad68ab8fef69df82de6456fbb48b63f60c9c9097be968ea872c4801e5d0711b4373c7224ed7a9cbd49d40f82bdb6afc0036824be26fc96e49a70e90797e6caa1b38ddacb3cb2b3eac7c068a185b644582f25edfa3d6a46e2a894ca809a422a6a29bd7145bb6e7992570484d6a710292ea0c3f97b7cbff701684b13c5593262534a7af9eab48f2ca2d74d9a4de33", 0xda}, {&(0x7f0000000c00)="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", 0x114}, {&(0x7f0000000a40)="0a985d7879f1bbff16c7d66e33657e452299fd0ef8c2afda588eb05891b7da030e01452a7986bea19b59c98dc2996c0ea09604d00ea48336d0c813d83025aca8623a5915ddddce2c11c5e374f2e0f387d2398fe0b899ff60dc7a73addcf253cf32aafbe2b9f90799e7fc583bdd9b564697ba988080270bdceb4714219a2d4c229fffb0d86fb286e3553a8b3ac02badc66ada5fceabe5f63c79da96e641a45901128063d6e1e31b11bcfbc3e70bd3c8c6c0be9f653f977f16", 0xfff0}, {&(0x7f0000000840)="6f4720baeb54", 0x6}], 0x4}, 0x0) 749.273677ms ago: executing program 4 (id=15611): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x2, @perf_config_ext={0x408003, 0x1}, 0x14105, 0x32, 0xfffffbff, 0x0, 0x6, 0x0, 0xffda, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000008000000850000008600000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYRESOCT=r6], 0x31) r7 = socket$kcm(0x15, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000940)) r8 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@fallback=r8, 0xb, 0x1, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@fallback=r0, r4, 0x2d, 0x3, r4, @void, @value=r2, @void, @void, r9}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x8a}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8946, &(0x7f0000000080)) 630.175596ms ago: executing program 3 (id=15612): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x3, @remote, 0x5, 0x3}, 0x80, 0x0}, 0x2600c055) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000e200000000611118"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r1, 0x0, 0x0) 604.912431ms ago: executing program 1 (id=15613): r0 = socket$kcm(0x11, 0x2, 0x0) close(r0) r1 = socket$kcm(0x11, 0x2, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x8) r3 = socket$kcm(0x11, 0x2, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000050000006cff57"], 0x48) setsockopt$sock_attach_bpf(r3, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x8) socket$kcm(0x11, 0xa, 0x300) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce220010"], 0xcfa4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12000) sendmsg$inet(0xffffffffffffffff, 0x0, 0x3000c085) socket$kcm(0xa, 0x1, 0x106) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd63"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 539.998369ms ago: executing program 3 (id=15614): socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, 0x0, 0xc0}, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x3, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 491.53276ms ago: executing program 0 (id=15615): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700000004000000000900000100000028"], 0x50) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e", 0x19}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c23003f) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x10021, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4d, 0xe67}, 0x11080, 0xffffffffffffffff, 0x3, 0x9, 0xa17c, 0x40ff, 0x5, 0x0, 0xd, 0x0, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000002b00)) ioctl$SIOCSIFHWADDR(r3, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @broadcast}) r4 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x29, 0x1f, &(0x7f0000000040), 0xcf) write$cgroup_devices(r1, 0x0, 0xa) sendmsg$kcm(r1, &(0x7f0000002ac0)={&(0x7f0000001100)=@ieee802154={0x24, @short={0x2, 0xffff}}, 0x80, &(0x7f0000002780)=[{0x0}], 0x1}, 0x4000) socket$kcm(0xa, 0x7, 0x73) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)}, 0x40000) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000007000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r6}, 0xc) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000100850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465cbf188ef10871b81ac7553358380b3a1f59916ffc9bf0bdf81524f07fb2819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6cd87cef9000000a39c15a7ef365cc27dfeac7b9b0e9048517354b0ca4f9cf8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19ea2eb42122b8635a66ce6b5b92356081bc0f18a0ca83dbc089a9813c1efa26001b3f486ebfaae85c4d0b96778478ae5355e6f923b11056969f486f80a35f7f2339704fa93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d0000000000000000000000004e1fa60acabcf0553910ca2e5ea499fd5889dde9261f0848a5b8af657bfc96049308e8953431b269053627a1523551c160c813969925a892d266792352ec0204596a37ce8d6d260b32239bddbce2e79f93cb5a0ad897adb53b397d07c50f84b74f2605a565ee149016aa75ea31c0087dcd821b47c8b36efc6da4fb2ea7f1f36c85856b73ac9872babc62149699b6b8c796a79d833eb4b5ca668d430db5653a2b3c5b87e17ca1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r0, 0x58, &(0x7f0000000480)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a00)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000040000000b0000000000000a000000000e0000000000000a05000000030000000000000801000000100000000000000c050000000f00000000000010080000000600000002000005090000000900000004000000ff0300000500000005000000030000000061000046c773d010e2494154b655048ee967019563cca98534b8aa2dbc30877eb109549cca846b6bfec9417abccb40098f790000df4ea9b28e1041262c963ef280d2088065eeedbea103553f6a72753ab08f2f0c6fbc00a6aa10ad09a65fe1f4fa88b2b96075f83cfbb8f1bc70fca126d8ca0e"], &(0x7f0000000900)=""/240, 0x7c, 0xf0, 0x0, 0xffffffff}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x20, 0x0, &(0x7f00000002c0)="b90103616908068c3c270040e700009e0dc5cf1d66fff2fcffff8100632f2991", 0x0, 0x8104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 360.119087ms ago: executing program 3 (id=15616): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x55}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000000)="76ea090000000000009ba56a8864", 0x0, 0xff, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x5, 0x14, 0x0, &(0x7f0000000000)='%', 0x0, 0x7fffffff, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (fail_nth: 3) 9.415512ms ago: executing program 32 (id=15555): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000040)={'macvtap0\x00', @random='\x00\x00\x00\x00\x00 '}) (fail_nth: 8) 0s ago: executing program 3 (id=15618): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x3500000000000000) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x2, 0x2) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000003c0)="d80000001d0081054e81f783db4cb9040a00000000000000e8fc3ca10a0015000600142603600e1208000f0000000401a80001000047880000000000035c0461c1d67f6f94007134cf6efb8000feea60d8a8a007a290457f0189b316277ce06bbaceac3c2fb14c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775820d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809", 0xa2}], 0x1}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012000000000000000000"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x3, 0x5, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x0, 0x0, 0x9, 0x0, 0x7, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x23, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89ed, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)}, 0x120) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x6d, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed009875f37538e486dd0000000003"], 0xfe1b) recvmsg(r2, &(0x7f0000003e40)={0x0, 0x0, &(0x7f0000003d40)=[{&(0x7f0000000a00)=""/118, 0x76}, {&(0x7f0000000a80)=""/156, 0x9c}, {&(0x7f00000001c0)=""/43, 0x2b}, {&(0x7f0000000b40)=""/167, 0xa7}, {&(0x7f0000000c00)=""/23, 0x17}, {&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/149, 0x95}], 0x8, &(0x7f0000003e00)=""/3, 0x3}, 0x0) r3 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r3, &(0x7f00000037c0)=ANY=[@ANYBLOB="1c0000005f00071b189da80400008000000000af1f"], 0xfe33) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) recvmsg(r2, &(0x7f00000009c0)={&(0x7f0000000240)=@isdn, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f00000002c0)=""/166, 0xa6}, {&(0x7f00000003c0)=""/171, 0xab}, {&(0x7f0000000600)=""/68, 0x44}, {&(0x7f0000000680)=""/173, 0xad}, {&(0x7f0000000740)=""/210, 0xd2}, {&(0x7f0000000840)=""/194, 0xc2}], 0x7, &(0x7f00000001c0)}, 0x400000a6) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) kernel console output (not intermixed with test programs): d_addr+0x89/0x350 [ 2728.169744][T16799] __kmem_cache_alloc_node+0x4f/0x260 [ 2728.169766][T16799] ? sctp_add_bind_addr+0x89/0x350 [ 2728.169789][T16799] kmalloc_trace+0x26/0xe0 [ 2728.169815][T16799] sctp_add_bind_addr+0x89/0x350 [ 2728.169842][T16799] sctp_copy_local_addr_list+0x311/0x4e0 [ 2728.169868][T16799] ? sctp_copy_local_addr_list+0xa1/0x4e0 [ 2728.169893][T16799] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 2728.169920][T16799] ? sctp_v4_is_any+0x31/0x50 [ 2728.169951][T16799] ? sctp_copy_one_addr+0x93/0x660 [ 2728.169977][T16799] sctp_bind_addr_copy+0xaf/0x3c0 [ 2728.170000][T16799] ? sctp_assoc_set_bind_addr_from_ep+0xa1/0x190 [ 2728.170022][T16799] sctp_connect_new_asoc+0x2f5/0x6a0 [ 2728.170050][T16799] ? __sctp_connect+0xd80/0xd80 [ 2728.170072][T16799] ? __local_bh_enable_ip+0x136/0x1c0 [ 2728.170090][T16799] ? _local_bh_enable+0xa0/0xa0 [ 2728.170106][T16799] ? sctp_endpoint_lookup_assoc+0x77/0x260 [ 2728.170130][T16799] ? sctp_endpoint_lookup_assoc+0x77/0x260 [ 2728.170154][T16799] ? bpf_lsm_sctp_bind_connect+0x5/0x10 [ 2728.170173][T16799] ? security_sctp_bind_connect+0x85/0xb0 [ 2728.170196][T16799] sctp_sendmsg+0x15b0/0x2940 [ 2728.170231][T16799] ? aa_sk_perm+0x781/0x950 [ 2728.170255][T16799] ? sctp_getsockopt+0x8a0/0x8a0 [ 2728.170279][T16799] ? __might_fault+0xa6/0x120 [ 2728.170298][T16799] ? aa_af_perm+0x340/0x340 [ 2728.170317][T16799] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 2728.170351][T16799] ? inet_sendmsg+0x78/0x2f0 [ 2728.170374][T16799] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2728.170392][T16799] ? security_socket_sendmsg+0x7c/0xa0 [ 2728.170418][T16799] ? inet_send_prepare+0x260/0x260 [ 2728.170441][T16799] ____sys_sendmsg+0x5be/0x970 [ 2728.170473][T16799] ? __sys_sendmsg_sock+0x30/0x30 [ 2728.170494][T16799] ? __import_iovec+0x315/0x500 [ 2728.170520][T16799] ? import_iovec+0x6f/0xa0 [ 2728.170542][T16799] ___sys_sendmsg+0x2a2/0x360 [ 2728.170570][T16799] ? __sys_sendmsg+0x290/0x290 [ 2728.170612][T16799] ? __lock_acquire+0x7d10/0x7d10 [ 2728.170659][T16799] __se_sys_sendmsg+0x1bb/0x2a0 [ 2728.170686][T16799] ? __x64_sys_sendmsg+0x80/0x80 [ 2728.416775][T16799] ? lockdep_hardirqs_on+0x94/0x140 [ 2728.421980][T16799] do_syscall_64+0x4c/0xa0 [ 2728.426394][T16799] ? clear_bhb_loop+0x60/0xb0 [ 2728.431068][T16799] ? clear_bhb_loop+0x60/0xb0 [ 2728.435829][T16799] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2728.441724][T16799] RIP: 0033:0x7f0776b9c799 [ 2728.446219][T16799] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2728.465823][T16799] RSP: 002b:00007f0777a10028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2728.474415][T16799] RAX: ffffffffffffffda RBX: 00007f0776e15fa0 RCX: 00007f0776b9c799 [ 2728.482388][T16799] RDX: 0000000000004000 RSI: 0000200000000e40 RDI: 0000000000000004 [ 2728.490357][T16799] RBP: 00007f0777a10090 R08: 0000000000000000 R09: 0000000000000000 [ 2728.498757][T16799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2728.506724][T16799] R13: 00007f0776e16038 R14: 00007f0776e15fa0 R15: 00007ffc415d5b98 [ 2728.514709][T16799] [ 2728.519586][T16804] CPU: 0 PID: 16804 Comm: syz.4.14974 Not tainted syzkaller #0 [ 2728.527159][T16804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2728.537212][T16804] Call Trace: [ 2728.540483][T16804] [ 2728.543406][T16804] dump_stack_lvl+0x188/0x24e [ 2728.548093][T16804] ? show_regs_print_info+0x12/0x12 [ 2728.553322][T16804] ? load_image+0x400/0x400 [ 2728.557823][T16804] ? __lock_acquire+0x7d10/0x7d10 [ 2728.562847][T16804] should_fail_ex+0x399/0x4d0 [ 2728.567516][T16804] _copy_from_user+0x2c/0x170 [ 2728.572190][T16804] ____sys_sendmsg+0x30a/0x970 [ 2728.576961][T16804] ? __sys_sendmsg_sock+0x30/0x30 [ 2728.581982][T16804] ? __import_iovec+0x315/0x500 [ 2728.586827][T16804] ? import_iovec+0x6f/0xa0 [ 2728.591323][T16804] ___sys_sendmsg+0x2a2/0x360 [ 2728.596006][T16804] ? __sys_sendmsg+0x290/0x290 [ 2728.600774][T16804] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2728.606777][T16804] __se_sys_sendmsg+0x1bb/0x2a0 [ 2728.611631][T16804] ? __x64_sys_sendmsg+0x80/0x80 [ 2728.616582][T16804] ? lockdep_hardirqs_on+0x94/0x140 [ 2728.621777][T16804] do_syscall_64+0x4c/0xa0 [ 2728.626188][T16804] ? clear_bhb_loop+0x60/0xb0 [ 2728.630869][T16804] ? clear_bhb_loop+0x60/0xb0 [ 2728.635544][T16804] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2728.641432][T16804] RIP: 0033:0x7fe02159c799 [ 2728.645838][T16804] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2728.665529][T16804] RSP: 002b:00007fe0223a1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2728.673941][T16804] RAX: ffffffffffffffda RBX: 00007fe021815fa0 RCX: 00007fe02159c799 [ 2728.681910][T16804] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000004 [ 2728.689869][T16804] RBP: 00007fe0223a1090 R08: 0000000000000000 R09: 0000000000000000 [ 2728.697833][T16804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2728.705792][T16804] R13: 00007fe021816038 R14: 00007fe021815fa0 R15: 00007ffdb0b5ace8 [ 2728.713767][T16804] [ 2728.764024][ T6587] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2728.859534][ T6587] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2728.867409][ T6587] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2728.906846][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2729.061377][T16820] netlink: 'syz.3.14975': attribute type 29 has an invalid length. [ 2729.103345][T16820] netlink: 'syz.3.14975': attribute type 29 has an invalid length. [ 2729.167409][T16810] netlink: 'syz.3.14975': attribute type 29 has an invalid length. [ 2729.215088][T16810] netlink: 'syz.3.14975': attribute type 29 has an invalid length. [ 2729.261152][T16826] FAULT_INJECTION: forcing a failure. [ 2729.261152][T16826] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2729.304174][T16826] CPU: 0 PID: 16826 Comm: syz.1.14978 Not tainted syzkaller #0 [ 2729.311786][T16826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2729.321866][T16826] Call Trace: [ 2729.325165][T16826] [ 2729.328115][T16826] dump_stack_lvl+0x188/0x24e [ 2729.332824][T16826] ? show_regs_print_info+0x12/0x12 [ 2729.338056][T16826] ? load_image+0x400/0x400 [ 2729.342597][T16826] ? __lock_acquire+0x7d10/0x7d10 [ 2729.347673][T16826] should_fail_ex+0x399/0x4d0 [ 2729.352467][T16826] _copy_to_user+0x2c/0x130 [ 2729.357005][T16826] bpf_verifier_vlog+0x172/0x390 [ 2729.361984][T16826] __btf_verifier_log+0xdf/0x130 [ 2729.366960][T16826] ? btf_check_sec_info+0x350/0x350 [ 2729.372194][T16826] ? __virt_addr_valid+0x188/0x540 [ 2729.377335][T16826] ? btf_parse_hdr+0x1e0/0x7e0 [ 2729.382131][T16826] btf_parse_hdr+0x431/0x7e0 [ 2729.386759][T16826] btf_new_fd+0x3c6/0x780 [ 2729.391128][T16826] __sys_bpf+0x612/0x780 [ 2729.395398][T16826] ? bpf_link_show_fdinfo+0x380/0x380 [ 2729.400810][T16826] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2729.407011][T16826] __x64_sys_bpf+0x78/0x90 [ 2729.411459][T16826] do_syscall_64+0x4c/0xa0 [ 2729.415905][T16826] ? clear_bhb_loop+0x60/0xb0 [ 2729.420613][T16826] ? clear_bhb_loop+0x60/0xb0 [ 2729.425318][T16826] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2729.431234][T16826] RIP: 0033:0x7f3408f9c799 [ 2729.435665][T16826] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2729.455315][T16826] RSP: 002b:00007f3409f2b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2729.463757][T16826] RAX: ffffffffffffffda RBX: 00007f3409215fa0 RCX: 00007f3408f9c799 [ 2729.471753][T16826] RDX: 0000000000000028 RSI: 0000200000000280 RDI: 0000000000000012 [ 2729.479751][T16826] RBP: 00007f3409f2b090 R08: 0000000000000000 R09: 0000000000000000 [ 2729.487741][T16826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2729.495734][T16826] R13: 00007f3409216038 R14: 00007f3409215fa0 R15: 00007fff7d7f2418 [ 2729.503839][T16826] [ 2729.898291][T16849] netlink: 'syz.1.14985': attribute type 10 has an invalid length. [ 2730.387263][T16858] mac80211_hwsim hwsim350 »»»»»»: renamed from wlan0 [ 2730.728279][ T4281] Bluetooth: hci1: command 0x0406 tx timeout [ 2730.751909][T16882] netlink: 'syz.1.14996': attribute type 2 has an invalid length. [ 2730.761579][T16882] netlink: 10 bytes leftover after parsing attributes in process `syz.1.14996'. [ 2730.785650][T16876] device syzkaller0 entered promiscuous mode [ 2730.802412][T16884] netlink: 'syz.2.14995': attribute type 2 has an invalid length. [ 2730.828505][T16884] netlink: 10 bytes leftover after parsing attributes in process `syz.2.14995'. [ 2730.955073][T16892] netlink: 'syz.1.14998': attribute type 11 has an invalid length. [ 2730.969111][T16892] netlink: 111676 bytes leftover after parsing attributes in process `syz.1.14998'. [ 2731.186328][T16898] netlink: 132 bytes leftover after parsing attributes in process `syz.4.15000'. [ 2731.224233][T16900] netlink: 132 bytes leftover after parsing attributes in process `syz.2.15001'. [ 2731.361597][T16904] batman_adv: batadv0: Adding interface: netdevsim0 [ 2731.376744][T16904] batman_adv: batadv0: The MTU of interface netdevsim0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2731.437882][T16904] batman_adv: batadv0: Not using interface netdevsim0 (retrying later): interface not active [ 2734.432916][T16915] validate_nla: 3 callbacks suppressed [ 2734.432932][T16915] netlink: 'syz.4.15006': attribute type 10 has an invalid length. [ 2734.447513][T16915] device veth0_macvtap left promiscuous mode [ 2734.660634][T16933] netlink: 'syz.3.15012': attribute type 11 has an invalid length. [ 2734.680453][T16933] netlink: 111676 bytes leftover after parsing attributes in process `syz.3.15012'. [ 2734.694124][T16935] netlink: 'syz.0.15013': attribute type 2 has an invalid length. [ 2734.727462][T16935] netlink: 10 bytes leftover after parsing attributes in process `syz.0.15013'. [ 2734.745317][T16938] netlink: 'syz.2.15014': attribute type 21 has an invalid length. [ 2734.954186][T16948] netlink: 'syz.3.15018': attribute type 10 has an invalid length. [ 2735.207707][T16948] team0: Port device geneve1 added [ 2736.175725][T16982] FAULT_INJECTION: forcing a failure. [ 2736.175725][T16982] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2736.230975][T16982] CPU: 1 PID: 16982 Comm: syz.3.15027 Not tainted syzkaller #0 [ 2736.238575][T16982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2736.248650][T16982] Call Trace: [ 2736.251925][T16982] [ 2736.254862][T16982] dump_stack_lvl+0x188/0x24e [ 2736.259539][T16982] ? show_regs_print_info+0x12/0x12 [ 2736.264735][T16982] ? load_image+0x400/0x400 [ 2736.269232][T16982] ? __lock_acquire+0x7d10/0x7d10 [ 2736.274254][T16982] should_fail_ex+0x399/0x4d0 [ 2736.278924][T16982] _copy_from_user+0x2c/0x170 [ 2736.283597][T16982] __sys_bpf+0x2ea/0x780 [ 2736.287844][T16982] ? bpf_link_show_fdinfo+0x380/0x380 [ 2736.293217][T16982] ? lock_chain_count+0x20/0x20 [ 2736.298075][T16982] __x64_sys_bpf+0x78/0x90 [ 2736.302495][T16982] do_syscall_64+0x4c/0xa0 [ 2736.306914][T16982] ? clear_bhb_loop+0x60/0xb0 [ 2736.311583][T16982] ? clear_bhb_loop+0x60/0xb0 [ 2736.316251][T16982] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2736.322142][T16982] RIP: 0033:0x7f0776b9c799 [ 2736.326682][T16982] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2736.346295][T16982] RSP: 002b:00007f0777a10028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2736.354707][T16982] RAX: ffffffffffffffda RBX: 00007f0776e15fa0 RCX: 00007f0776b9c799 [ 2736.362677][T16982] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 2736.370643][T16982] RBP: 00007f0777a10090 R08: 0000000000000000 R09: 0000000000000000 [ 2736.378616][T16982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2736.386581][T16982] R13: 00007f0776e16038 R14: 00007f0776e15fa0 R15: 00007ffc415d5b98 [ 2736.394559][T16982] [ 2736.461644][T16986] netlink: 'syz.1.15028': attribute type 11 has an invalid length. [ 2736.489588][T16986] netlink: 111676 bytes leftover after parsing attributes in process `syz.1.15028'. [ 2737.137262][T17018] netlink: 'syz.1.15043': attribute type 16 has an invalid length. [ 2737.160107][T17018] netlink: 48 bytes leftover after parsing attributes in process `syz.1.15043'. [ 2737.270427][T17022] FAULT_INJECTION: forcing a failure. [ 2737.270427][T17022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2737.296666][T17022] CPU: 1 PID: 17022 Comm: syz.2.15045 Not tainted syzkaller #0 [ 2737.304268][T17022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2737.314415][T17022] Call Trace: [ 2737.317716][T17022] [ 2737.320672][T17022] dump_stack_lvl+0x188/0x24e [ 2737.325468][T17022] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2737.331654][T17022] ? show_regs_print_info+0x12/0x12 [ 2737.336880][T17022] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2737.343057][T17022] should_fail_ex+0x399/0x4d0 [ 2737.347743][T17022] _copy_from_user+0x2c/0x170 [ 2737.352436][T17022] ____sys_sendmsg+0x30a/0x970 [ 2737.357211][T17022] ? __sys_sendmsg_sock+0x30/0x30 [ 2737.362236][T17022] ? __import_iovec+0x315/0x500 [ 2737.367090][T17022] ? import_iovec+0x6f/0xa0 [ 2737.371590][T17022] ___sys_sendmsg+0x2a2/0x360 [ 2737.376281][T17022] ? __sys_sendmsg+0x290/0x290 [ 2737.381075][T17022] ? ktime_get_real_ts64+0x440/0x440 [ 2737.386386][T17022] __se_sys_sendmsg+0x1bb/0x2a0 [ 2737.391235][T17022] ? ct_nmi_exit+0x145/0x1c0 [ 2737.395820][T17022] ? __x64_sys_sendmsg+0x80/0x80 [ 2737.400773][T17022] ? lockdep_hardirqs_on+0x94/0x140 [ 2737.405966][T17022] do_syscall_64+0x4c/0xa0 [ 2737.410401][T17022] ? clear_bhb_loop+0x60/0xb0 [ 2737.415077][T17022] ? clear_bhb_loop+0x60/0xb0 [ 2737.419836][T17022] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2737.425731][T17022] RIP: 0033:0x7fab2d19c799 [ 2737.430138][T17022] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2737.449741][T17022] RSP: 002b:00007fab2e042028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2737.458150][T17022] RAX: ffffffffffffffda RBX: 00007fab2d415fa0 RCX: 00007fab2d19c799 [ 2737.466113][T17022] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000005 [ 2737.474078][T17022] RBP: 00007fab2e042090 R08: 0000000000000000 R09: 0000000000000000 [ 2737.482040][T17022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2737.490002][T17022] R13: 00007fab2d416038 R14: 00007fab2d415fa0 R15: 00007ffd13416498 [ 2737.497985][T17022] [ 2737.664009][T17030] delete_channel: no stack [ 2737.684211][T17030] delete_channel: no stack [ 2738.551887][T17063] netlink: 'syz.4.15056': attribute type 10 has an invalid length. [ 2738.741508][T17063] team0: Port device geneve1 added [ 2738.856876][T17074] netlink: 'syz.0.15061': attribute type 6 has an invalid length. [ 2738.894384][T17074] netlink: 127868 bytes leftover after parsing attributes in process `syz.0.15061'. [ 2739.100183][T17077] delete_channel: no stack [ 2739.244813][T17092] netlink: 'syz.0.15076': attribute type 10 has an invalid length. [ 2739.537330][T17092] team0: Port device geneve1 added [ 2739.909532][T17120] netlink: 'syz.2.15073': attribute type 3 has an invalid length. [ 2739.948146][T17120] netlink: 16066 bytes leftover after parsing attributes in process `syz.2.15073'. [ 2739.985661][T17121] bond0: (slave »»»»»»): Enslaving as an active interface with an up link [ 2740.071039][T17127] bond0: (slave »»»»»»): Enslaving as an active interface with an up link [ 2740.167178][T17129] netlink: 'syz.4.15077': attribute type 6 has an invalid length. [ 2740.198047][T17129] netlink: 127868 bytes leftover after parsing attributes in process `syz.4.15077'. [ 2740.842695][T17142] FAULT_INJECTION: forcing a failure. [ 2740.842695][T17142] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2740.857894][T17142] CPU: 0 PID: 17142 Comm: syz.4.15081 Not tainted syzkaller #0 [ 2740.865488][T17142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2740.875566][T17142] Call Trace: [ 2740.878860][T17142] [ 2740.881810][T17142] dump_stack_lvl+0x188/0x24e [ 2740.886519][T17142] ? show_regs_print_info+0x12/0x12 [ 2740.891748][T17142] ? load_image+0x400/0x400 [ 2740.896284][T17142] ? __lock_acquire+0x7d10/0x7d10 [ 2740.901350][T17142] should_fail_ex+0x399/0x4d0 [ 2740.906054][T17142] _copy_from_user+0x2c/0x170 [ 2740.910768][T17142] bpf_ctx_init+0x136/0x1a0 [ 2740.915306][T17142] bpf_prog_test_run_sk_lookup+0x2ae/0xbe0 [ 2740.921157][T17142] ? bpf_test_timer_leave+0x150/0x150 [ 2740.926551][T17142] ? bpf_test_timer_leave+0x150/0x150 [ 2740.931922][T17142] bpf_prog_test_run+0x31e/0x390 [ 2740.936866][T17142] __sys_bpf+0x62b/0x780 [ 2740.941110][T17142] ? bpf_link_show_fdinfo+0x380/0x380 [ 2740.946496][T17142] ? lock_chain_count+0x20/0x20 [ 2740.951348][T17142] __x64_sys_bpf+0x78/0x90 [ 2740.955760][T17142] do_syscall_64+0x4c/0xa0 [ 2740.960178][T17142] ? clear_bhb_loop+0x60/0xb0 [ 2740.964850][T17142] ? clear_bhb_loop+0x60/0xb0 [ 2740.969524][T17142] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2740.975415][T17142] RIP: 0033:0x7fe02159c799 [ 2740.979839][T17142] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2740.999528][T17142] RSP: 002b:00007fe0223a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2741.007939][T17142] RAX: ffffffffffffffda RBX: 00007fe021815fa0 RCX: 00007fe02159c799 [ 2741.015905][T17142] RDX: 0000000000000048 RSI: 0000200000000440 RDI: 000000000000000a [ 2741.023869][T17142] RBP: 00007fe0223a1090 R08: 0000000000000000 R09: 0000000000000000 [ 2741.031834][T17142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2741.039795][T17142] R13: 00007fe021816038 R14: 00007fe021815fa0 R15: 00007ffdb0b5ace8 [ 2741.047780][T17142] [ 2741.165892][T17144] netlink: 'syz.1.15082': attribute type 10 has an invalid length. [ 2742.122178][T17168] FAULT_INJECTION: forcing a failure. [ 2742.122178][T17168] name failslab, interval 1, probability 0, space 0, times 0 [ 2742.167964][T17168] CPU: 1 PID: 17168 Comm: syz.3.15090 Not tainted syzkaller #0 [ 2742.175584][T17168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2742.185660][T17168] Call Trace: [ 2742.188957][T17168] [ 2742.191901][T17168] dump_stack_lvl+0x188/0x24e [ 2742.196695][T17168] ? show_regs_print_info+0x12/0x12 [ 2742.201916][T17168] ? load_image+0x400/0x400 [ 2742.206421][T17168] ? verify_lock_unused+0x140/0x140 [ 2742.211621][T17168] should_fail_ex+0x399/0x4d0 [ 2742.216291][T17168] should_failslab+0x5/0x20 [ 2742.220796][T17168] slab_pre_alloc_hook+0x59/0x310 [ 2742.225816][T17168] kmem_cache_alloc+0x56/0x2f0 [ 2742.230571][T17168] ? skb_clone+0x1e7/0x370 [ 2742.234994][T17168] skb_clone+0x1e7/0x370 [ 2742.239235][T17168] __netlink_deliver_tap+0x3ed/0x800 [ 2742.244526][T17168] ? netlink_deliver_tap+0x2e/0x1b0 [ 2742.249717][T17168] netlink_deliver_tap+0x19c/0x1b0 [ 2742.254822][T17168] netlink_unicast+0x728/0x8d0 [ 2742.259588][T17168] netlink_sendmsg+0x8ad/0xbd0 [ 2742.264366][T17168] ? netlink_getsockopt+0x550/0x550 [ 2742.269565][T17168] ? aa_sock_msg_perm+0x94/0x150 [ 2742.274495][T17168] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2742.279774][T17168] ? security_socket_sendmsg+0x7c/0xa0 [ 2742.285253][T17168] ? netlink_getsockopt+0x550/0x550 [ 2742.290809][T17168] ____sys_sendmsg+0x5be/0x970 [ 2742.295587][T17168] ? __sys_sendmsg_sock+0x30/0x30 [ 2742.300610][T17168] ? __import_iovec+0x315/0x500 [ 2742.305468][T17168] ? import_iovec+0x6f/0xa0 [ 2742.309974][T17168] ___sys_sendmsg+0x2a2/0x360 [ 2742.314656][T17168] ? __sys_sendmsg+0x290/0x290 [ 2742.319429][T17168] ? __lock_acquire+0x7d10/0x7d10 [ 2742.324473][T17168] __se_sys_sendmsg+0x1bb/0x2a0 [ 2742.329325][T17168] ? __x64_sys_sendmsg+0x80/0x80 [ 2742.334269][T17168] ? lockdep_hardirqs_on+0x94/0x140 [ 2742.339467][T17168] do_syscall_64+0x4c/0xa0 [ 2742.343881][T17168] ? clear_bhb_loop+0x60/0xb0 [ 2742.348554][T17168] ? clear_bhb_loop+0x60/0xb0 [ 2742.353225][T17168] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2742.359112][T17168] RIP: 0033:0x7f0776b9c799 [ 2742.363518][T17168] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2742.383138][T17168] RSP: 002b:00007f0777a10028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2742.391553][T17168] RAX: ffffffffffffffda RBX: 00007f0776e15fa0 RCX: 00007f0776b9c799 [ 2742.399517][T17168] RDX: 0000000020000800 RSI: 0000200000000600 RDI: 0000000000000003 [ 2742.407679][T17168] RBP: 00007f0777a10090 R08: 0000000000000000 R09: 0000000000000000 [ 2742.415662][T17168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2742.423645][T17168] R13: 00007f0776e16038 R14: 00007f0776e15fa0 R15: 00007ffc415d5b98 [ 2742.431629][T17168] [ 2742.458162][T17168] netlink: 'syz.3.15090': attribute type 10 has an invalid length. [ 2742.522528][T17168] team0: Port device macvlan0 added [ 2742.706201][T17176] FAULT_INJECTION: forcing a failure. [ 2742.706201][T17176] name failslab, interval 1, probability 0, space 0, times 0 [ 2742.727006][T17172] netlink: 'syz.1.15092': attribute type 6 has an invalid length. [ 2742.735440][T17176] CPU: 1 PID: 17176 Comm: syz.4.15093 Not tainted syzkaller #0 [ 2742.743022][T17176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2742.750603][T17172] netlink: 127868 bytes leftover after parsing attributes in process `syz.1.15092'. [ 2742.753084][T17176] Call Trace: [ 2742.753096][T17176] [ 2742.753105][T17176] dump_stack_lvl+0x188/0x24e [ 2742.773396][T17176] ? show_regs_print_info+0x12/0x12 [ 2742.778622][T17176] ? load_image+0x400/0x400 [ 2742.783153][T17176] ? __might_sleep+0xd0/0xd0 [ 2742.787765][T17176] ? __lock_acquire+0x7d10/0x7d10 [ 2742.792812][T17176] ? verify_lock_unused+0x140/0x140 [ 2742.798148][T17176] should_fail_ex+0x399/0x4d0 [ 2742.802914][T17176] should_failslab+0x5/0x20 [ 2742.807415][T17176] slab_pre_alloc_hook+0x59/0x310 [ 2742.812445][T17176] ? __get_vm_area_node+0x122/0x330 [ 2742.817729][T17176] __kmem_cache_alloc_node+0x4f/0x260 [ 2742.823105][T17176] ? __get_vm_area_node+0x122/0x330 [ 2742.828301][T17176] kmalloc_node_trace+0x22/0xe0 [ 2742.833150][T17176] __get_vm_area_node+0x122/0x330 [ 2742.838169][T17176] ? __local_bh_enable_ip+0x136/0x1c0 [ 2742.843536][T17176] __vmalloc_node_range+0x357/0x13b0 [ 2742.848815][T17176] ? netlink_sendmsg+0x5ec/0xbd0 [ 2742.853755][T17176] ? netlink_insert+0x1034/0x13c0 [ 2742.858787][T17176] ? free_vm_area+0x50/0x50 [ 2742.863295][T17176] ? netlink_sendmsg+0x5ec/0xbd0 [ 2742.868230][T17176] vmalloc+0x75/0x80 [ 2742.872120][T17176] ? netlink_sendmsg+0x5ec/0xbd0 [ 2742.877052][T17176] netlink_sendmsg+0x5ec/0xbd0 [ 2742.881819][T17176] ? netlink_getsockopt+0x550/0x550 [ 2742.887017][T17176] ? aa_sock_msg_perm+0x94/0x150 [ 2742.891955][T17176] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2742.897234][T17176] ? security_socket_sendmsg+0x7c/0xa0 [ 2742.902690][T17176] ? netlink_getsockopt+0x550/0x550 [ 2742.907885][T17176] ____sys_sendmsg+0x5be/0x970 [ 2742.912664][T17176] ? __sys_sendmsg_sock+0x30/0x30 [ 2742.917683][T17176] ? __import_iovec+0x315/0x500 [ 2742.922538][T17176] ? import_iovec+0x6f/0xa0 [ 2742.927039][T17176] ___sys_sendmsg+0x2a2/0x360 [ 2742.931714][T17176] ? __sys_sendmsg+0x290/0x290 [ 2742.936483][T17176] ? __lock_acquire+0x7d10/0x7d10 [ 2742.941516][T17176] __se_sys_sendmsg+0x1bb/0x2a0 [ 2742.946368][T17176] ? __x64_sys_sendmsg+0x80/0x80 [ 2742.951352][T17176] ? lockdep_hardirqs_on+0x94/0x140 [ 2742.956580][T17176] do_syscall_64+0x4c/0xa0 [ 2742.961093][T17176] ? clear_bhb_loop+0x60/0xb0 [ 2742.965769][T17176] ? clear_bhb_loop+0x60/0xb0 [ 2742.970443][T17176] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2742.976329][T17176] RIP: 0033:0x7fe02159c799 [ 2742.980744][T17176] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2743.000348][T17176] RSP: 002b:00007fe0223a1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2743.008756][T17176] RAX: ffffffffffffffda RBX: 00007fe021815fa0 RCX: 00007fe02159c799 [ 2743.016723][T17176] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000007 [ 2743.024684][T17176] RBP: 00007fe0223a1090 R08: 0000000000000000 R09: 0000000000000000 [ 2743.032643][T17176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2743.040602][T17176] R13: 00007fe021816038 R14: 00007fe021815fa0 R15: 00007ffdb0b5ace8 [ 2743.048587][T17176] [ 2743.059768][T17176] syz.4.15093: vmalloc error: size 213312, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 2743.076442][T17176] CPU: 1 PID: 17176 Comm: syz.4.15093 Not tainted syzkaller #0 [ 2743.084021][T17176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2743.094101][T17176] Call Trace: [ 2743.097377][T17176] [ 2743.100310][T17176] dump_stack_lvl+0x188/0x24e [ 2743.104994][T17176] ? cpuset_print_current_mems_allowed+0x1b/0x360 [ 2743.111504][T17176] ? show_regs_print_info+0x12/0x12 [ 2743.116700][T17176] ? load_image+0x400/0x400 [ 2743.121368][T17176] ? cpuset_print_current_mems_allowed+0x1b/0x360 [ 2743.127786][T17176] ? cpuset_print_current_mems_allowed+0x2e3/0x360 [ 2743.134386][T17176] warn_alloc+0x242/0x330 [ 2743.138725][T17176] ? __get_vm_area_node+0x122/0x330 [ 2743.143920][T17176] ? zone_watermark_ok_safe+0x270/0x270 [ 2743.149464][T17176] ? rcu_is_watching+0x11/0xa0 [ 2743.154229][T17176] ? __get_vm_area_node+0x318/0x330 [ 2743.159422][T17176] ? __local_bh_enable_ip+0x136/0x1c0 [ 2743.164790][T17176] __vmalloc_node_range+0x37c/0x13b0 [ 2743.170082][T17176] ? netlink_insert+0x1034/0x13c0 [ 2743.175113][T17176] ? free_vm_area+0x50/0x50 [ 2743.179616][T17176] ? netlink_sendmsg+0x5ec/0xbd0 [ 2743.184609][T17176] vmalloc+0x75/0x80 [ 2743.188499][T17176] ? netlink_sendmsg+0x5ec/0xbd0 [ 2743.193434][T17176] netlink_sendmsg+0x5ec/0xbd0 [ 2743.198246][T17176] ? netlink_getsockopt+0x550/0x550 [ 2743.203456][T17176] ? aa_sock_msg_perm+0x94/0x150 [ 2743.208390][T17176] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2743.213753][T17176] ? security_socket_sendmsg+0x7c/0xa0 [ 2743.219217][T17176] ? netlink_getsockopt+0x550/0x550 [ 2743.224413][T17176] ____sys_sendmsg+0x5be/0x970 [ 2743.229181][T17176] ? __sys_sendmsg_sock+0x30/0x30 [ 2743.234198][T17176] ? __import_iovec+0x315/0x500 [ 2743.239044][T17176] ? import_iovec+0x6f/0xa0 [ 2743.243544][T17176] ___sys_sendmsg+0x2a2/0x360 [ 2743.248224][T17176] ? __sys_sendmsg+0x290/0x290 [ 2743.253000][T17176] ? __lock_acquire+0x7d10/0x7d10 [ 2743.258039][T17176] __se_sys_sendmsg+0x1bb/0x2a0 [ 2743.262888][T17176] ? __x64_sys_sendmsg+0x80/0x80 [ 2743.267830][T17176] ? lockdep_hardirqs_on+0x94/0x140 [ 2743.273057][T17176] do_syscall_64+0x4c/0xa0 [ 2743.277473][T17176] ? clear_bhb_loop+0x60/0xb0 [ 2743.282139][T17176] ? clear_bhb_loop+0x60/0xb0 [ 2743.286815][T17176] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2743.292703][T17176] RIP: 0033:0x7fe02159c799 [ 2743.297133][T17176] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2743.316731][T17176] RSP: 002b:00007fe0223a1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2743.325139][T17176] RAX: ffffffffffffffda RBX: 00007fe021815fa0 RCX: 00007fe02159c799 [ 2743.333105][T17176] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000007 [ 2743.341076][T17176] RBP: 00007fe0223a1090 R08: 0000000000000000 R09: 0000000000000000 [ 2743.349045][T17176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2743.357009][T17176] R13: 00007fe021816038 R14: 00007fe021815fa0 R15: 00007ffdb0b5ace8 [ 2743.364984][T17176] [ 2743.386329][T17184] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.15095'. [ 2743.389518][T17176] Mem-Info: [ 2743.401378][T17176] active_anon:8154 inactive_anon:0 isolated_anon:0 [ 2743.401378][T17176] active_file:27792 inactive_file:40987 isolated_file:0 [ 2743.401378][T17176] unevictable:768 dirty:495 writeback:0 [ 2743.401378][T17176] slab_reclaimable:22081 slab_unreclaimable:111973 [ 2743.401378][T17176] mapped:30747 shmem:1361 pagetables:636 [ 2743.401378][T17176] sec_pagetables:0 bounce:0 [ 2743.401378][T17176] kernel_misc_reclaimable:0 [ 2743.401378][T17176] free:1289791 free_pcp:10316 free_cma:0 [ 2743.447129][T17176] Node 0 active_anon:32616kB inactive_anon:0kB active_file:111168kB inactive_file:163744kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:122988kB dirty:1980kB writeback:0kB shmem:3908kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:10088kB pagetables:2544kB sec_pagetables:0kB all_unreclaimable? no [ 2743.481693][T17176] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 2743.518891][T17176] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2743.547317][T17176] lowmem_reserve[]: 0 2527 2528 2528 2528 [ 2743.553285][T17176] Node 0 DMA32 free:1246340kB boost:0kB min:34692kB low:43364kB high:52036kB reserved_highatomic:0KB active_anon:32516kB inactive_anon:0kB active_file:111168kB inactive_file:163744kB unevictable:1536kB writepending:1980kB present:3129332kB managed:2592976kB mlocked:0kB bounce:0kB free_pcp:22748kB local_pcp:11236kB free_cma:0kB [ 2743.641968][T17176] lowmem_reserve[]: 0 0 1 1 1 [ 2743.647871][T17176] Node 0 Normal free:8kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:1424kB mlocked:0kB bounce:0kB free_pcp:20kB local_pcp:12kB free_cma:0kB [ 2743.687935][T17176] lowmem_reserve[]: 0 0 0 0 0 [ 2743.693005][T17176] Node 1 Normal free:3897584kB boost:0kB min:55192kB low:68988kB high:82784kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:19360kB local_pcp:8480kB free_cma:0kB [ 2743.723018][T17176] lowmem_reserve[]: 0 0 0 0 0 [ 2743.750911][T17176] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 2743.816390][T17176] Node 0 DMA32: 131*4kB (ME) 1859*8kB (UME) 2034*16kB (UME) 2980*32kB (UME) 2572*64kB (UME) 1536*128kB (UME) 606*256kB (UM) 216*512kB (UM) 37*1024kB (UM) 10*2048kB (UM) 102*4096kB (M) = 1246404kB [ 2743.907924][T17176] Node 0 Normal: 2*4kB (U) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 2743.967918][T17176] Node 1 Normal: 222*4kB (UE) 45*8kB (UE) 33*16kB (UME) 38*32kB (UME) 21*64kB (UME) 10*128kB (UME) 1*256kB (M) 3*512kB (UME) 1*1024kB (E) 1*2048kB (E) 949*4096kB (M) = 3897584kB [ 2744.047151][T17195] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15102'. [ 2744.067960][T17176] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2744.085394][T17176] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 2744.113777][T17176] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2744.143882][T17176] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 2744.187908][T17176] 70142 total pagecache pages [ 2744.212446][T17176] 0 pages in swap cache [ 2744.229240][T17176] Free swap = 124996kB [ 2744.247036][T17176] Total swap = 124996kB [ 2744.268078][T17176] 2097051 pages RAM [ 2744.287915][T17176] 0 pages HighMem/MovableOnly [ 2744.318502][T17176] 415206 pages reserved [ 2744.341287][T17176] 0 pages cma reserved [ 2744.768788][T31368] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 2744.779014][T31368] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 2744.788007][T31368] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 2744.796744][T31368] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 2744.809723][T31368] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 2744.817129][T31368] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 2744.865099][T17205] netlink: 161700 bytes leftover after parsing attributes in process `syz.0.15112'. [ 2744.941768][T17205] openvswitch: netlink: Key 2 has unexpected len 41210 expected 4 [ 2745.094640][ T6557] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2745.248182][ T6557] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2745.463400][ T6557] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2745.633842][ T6557] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2745.790274][T17203] chnl_net:caif_netlink_parms(): no params data found [ 2745.833898][T17237] netlink: 830 bytes leftover after parsing attributes in process `syz.4.15111'. [ 2746.048877][T17203] bridge0: port 1(bridge_slave_0) entered blocking state [ 2746.056022][T17203] bridge0: port 1(bridge_slave_0) entered disabled state [ 2746.086828][T17203] device bridge_slave_0 entered promiscuous mode [ 2746.139958][T17203] bridge0: port 2(bridge_slave_1) entered blocking state [ 2746.148196][T17203] bridge0: port 2(bridge_slave_1) entered disabled state [ 2746.231626][T17203] device bridge_slave_1 entered promiscuous mode [ 2746.313533][T17248] netlink: 132 bytes leftover after parsing attributes in process `syz.4.15115'. [ 2746.481037][T17203] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2746.581672][T17203] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2746.907359][T22314] Bluetooth: hci4: command 0x0409 tx timeout [ 2747.144938][T17203] team0: Port device team_slave_0 added [ 2747.239869][T17203] team0: Port device team_slave_1 added [ 2747.306086][T17203] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2747.354684][T17203] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2747.424399][T17203] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2747.526299][T17203] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2747.538937][T17203] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2747.647901][T17203] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2748.051808][T17308] bond0: (slave »»»»»»): Error: Slave device does not support XDP [ 2748.109908][T17203] device hsr_slave_0 entered promiscuous mode [ 2748.126592][T17203] device hsr_slave_1 entered promiscuous mode [ 2748.156378][T17203] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2748.166665][T17203] Cannot create hsr debugfs directory [ 2748.186411][ T6557] syzkaller: port 1(erspan0) entered disabled state [ 2748.214516][ T6557] device erspan0 left promiscuous mode [ 2748.220422][ T6557] syzkaller: port 1(erspan0) entered disabled state [ 2748.356236][ T6557] device gretap0 left promiscuous mode [ 2748.366475][ T6557] Ÿë: port 1(gretap0) entered disabled state [ 2748.968444][T22314] Bluetooth: hci4: command 0x041b tx timeout [ 2749.201608][T17333] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.15133'. [ 2749.260170][T17338] FAULT_INJECTION: forcing a failure. [ 2749.260170][T17338] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2749.301580][T17338] CPU: 0 PID: 17338 Comm: syz.0.15136 Not tainted syzkaller #0 [ 2749.309194][T17338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2749.319270][T17338] Call Trace: [ 2749.322610][T17338] [ 2749.325555][T17338] dump_stack_lvl+0x188/0x24e [ 2749.330348][T17338] ? show_regs_print_info+0x12/0x12 [ 2749.336010][T17338] ? load_image+0x400/0x400 [ 2749.340542][T17338] ? __lock_acquire+0x7d10/0x7d10 [ 2749.345679][T17338] ? __fget_files+0x28/0x4b0 [ 2749.350295][T17338] should_fail_ex+0x399/0x4d0 [ 2749.354977][T17338] _copy_from_user+0x2c/0x170 [ 2749.359656][T17338] bpf_obj_get_info_by_fd+0x45b/0x2f50 [ 2749.365115][T17338] ? perf_trace_buf_alloc+0x300/0x300 [ 2749.370483][T17338] ? verify_lock_unused+0x140/0x140 [ 2749.375684][T17338] ? bpf_map_get_fd_by_id+0x310/0x310 [ 2749.381052][T17338] ? perf_trace_lock+0xf8/0x390 [ 2749.385900][T17338] ? trace_event_raw_event_lock+0x250/0x250 [ 2749.391811][T17338] ? __might_fault+0xa6/0x120 [ 2749.396609][T17338] ? __might_fault+0xc2/0x120 [ 2749.401283][T17338] ? __might_fault+0xa6/0x120 [ 2749.405956][T17338] ? bpf_lsm_bpf+0x5/0x10 [ 2749.410278][T17338] ? security_bpf+0x7a/0xa0 [ 2749.414778][T17338] __sys_bpf+0x505/0x780 [ 2749.419031][T17338] ? bpf_link_show_fdinfo+0x380/0x380 [ 2749.424410][T17338] ? lock_chain_count+0x20/0x20 [ 2749.429255][T17338] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2749.435335][T17338] __x64_sys_bpf+0x78/0x90 [ 2749.439748][T17338] do_syscall_64+0x4c/0xa0 [ 2749.444161][T17338] ? clear_bhb_loop+0x60/0xb0 [ 2749.448832][T17338] ? clear_bhb_loop+0x60/0xb0 [ 2749.453507][T17338] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2749.459393][T17338] RIP: 0033:0x7f150d59c799 [ 2749.463805][T17338] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2749.483408][T17338] RSP: 002b:00007f150e4b9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2749.491817][T17338] RAX: ffffffffffffffda RBX: 00007f150d815fa0 RCX: 00007f150d59c799 [ 2749.499804][T17338] RDX: 0000000000000010 RSI: 0000200000000a00 RDI: 000000000000000f [ 2749.507870][T17338] RBP: 00007f150e4b9090 R08: 0000000000000000 R09: 0000000000000000 [ 2749.516032][T17338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2749.524009][T17338] R13: 00007f150d816038 R14: 00007f150d815fa0 R15: 00007ffc45026998 [ 2749.531997][T17338] [ 2749.679897][ T6557] bond0: (slave »»»»»»): Releasing backup interface [ 2751.048236][T22314] Bluetooth: hci4: command 0x040f tx timeout [ 2752.919828][ T6557] device veth0_to_team left promiscuous mode [ 2752.925998][ T6557] Ÿë: port 2(veth0_to_team) entered disabled state [ 2752.963422][ T6557] device hsr_slave_0 left promiscuous mode [ 2753.011565][ T6557] device hsr_slave_1 left promiscuous mode [ 2753.072937][ T6557] device veth0_macvtap left promiscuous mode [ 2753.101161][ T6557] device veth1_vlan left promiscuous mode [ 2753.147586][T22314] Bluetooth: hci4: command 0x0419 tx timeout [ 2753.157686][ T6557] device veth0_vlan left promiscuous mode [ 2755.169521][ T6557] bond0 (unregistering): (slave batadv_slave_0): Releasing backup interface [ 2755.300725][ T6557] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2755.578094][ T6557] bond0 (unregistering): Released all slaves [ 2755.785518][T17203] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2755.795464][T17203] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2755.821455][T17203] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2755.847415][T17203] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2755.924512][T17406] netlink: 'syz.0.15152': attribute type 21 has an invalid length. [ 2755.933540][T17406] netlink: 'syz.0.15152': attribute type 1 has an invalid length. [ 2755.945724][T17406] netlink: 132 bytes leftover after parsing attributes in process `syz.0.15152'. [ 2755.985350][T17410] tap0: tun_chr_ioctl cmd 1074025677 [ 2755.992208][T17410] tap0: linktype set to 270 [ 2756.361649][T17412] netlink: 1047 bytes leftover after parsing attributes in process `syz.0.15152'. [ 2758.829819][T17410] netlink: 'syz.4.15153': attribute type 17 has an invalid length. [ 2758.846762][T17410] netlink: 'syz.4.15153': attribute type 16 has an invalid length. [ 2758.857269][T17410] netlink: 152 bytes leftover after parsing attributes in process `syz.4.15153'. [ 2759.056106][T17203] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2759.115893][T17203] 8021q: adding VLAN 0 to HW filter on device team0 [ 2759.168491][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2759.176796][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2759.279672][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2759.306472][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2759.361613][T21569] bridge0: port 1(bridge_slave_0) entered blocking state [ 2759.368807][T21569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2759.490056][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2759.551290][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2759.628365][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2759.664603][ T6567] bridge0: port 2(bridge_slave_1) entered blocking state [ 2759.671811][ T6567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2759.803117][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2759.840071][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2759.985035][T17451] netlink: 35840 bytes leftover after parsing attributes in process `syz.4.15159'. [ 2760.025349][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2760.039702][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2760.065412][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2760.096452][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2760.113261][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2760.124501][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2760.141886][T17451] netlink: 14560 bytes leftover after parsing attributes in process `syz.4.15159'. [ 2760.196180][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2760.237096][T17203] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2760.297191][T17203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2760.356588][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2760.370133][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2761.069690][T17493] syz.4.15169[17493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2761.069805][T17493] syz.4.15169[17493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2761.096762][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2761.122818][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2761.145194][T17203] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2761.177566][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2761.199648][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2761.247590][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2761.281376][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2761.292744][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2761.304617][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2761.334242][T17203] device veth0_vlan entered promiscuous mode [ 2761.354820][T17203] device veth1_vlan entered promiscuous mode [ 2761.406734][T17203] device veth0_macvtap entered promiscuous mode [ 2761.433208][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2761.465013][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2761.482465][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2761.520854][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2761.585265][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2761.632143][T17203] device veth1_macvtap entered promiscuous mode [ 2761.652772][T17203] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2761.663926][T17203] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2761.674528][T17203] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2761.686170][T17203] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2761.717833][T17203] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2761.736364][T17203] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2761.759027][T17203] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2761.776043][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2761.795000][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2761.804695][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2761.837128][T17203] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2761.858256][T17203] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2761.872244][T17203] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2761.890080][T17203] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2761.901189][T17203] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2761.912333][T17203] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2761.922791][T17203] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2761.933672][T17203] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2761.945561][T17203] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2761.968486][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2761.977594][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2761.994666][T17203] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2762.015248][T17203] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2762.026469][T17203] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2762.037966][T17203] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2762.293454][ T6567] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2762.316265][ T6567] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2762.384065][ T6557] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2762.410483][ T6557] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2762.426696][ T6557] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2762.472067][ T6582] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2762.695853][T17519] syzkaller: port 1(erspan0) entered blocking state [ 2762.722586][T17519] syzkaller: port 1(erspan0) entered disabled state [ 2762.744328][T17519] device erspan0 entered promiscuous mode [ 2762.785144][T17529] syzkaller: port 1(erspan0) entered blocking state [ 2762.792030][T17529] syzkaller: port 1(erspan0) entered forwarding state [ 2762.849829][T17531] netlink: 16186 bytes leftover after parsing attributes in process `syz.1.15176'. [ 2763.256416][T17543] FAULT_INJECTION: forcing a failure. [ 2763.256416][T17543] name failslab, interval 1, probability 0, space 0, times 0 [ 2763.270173][T17543] CPU: 1 PID: 17543 Comm: syz.0.15181 Not tainted syzkaller #0 [ 2763.277763][T17543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2763.287839][T17543] Call Trace: [ 2763.291116][T17543] [ 2763.294039][T17543] dump_stack_lvl+0x188/0x24e [ 2763.298743][T17543] ? show_regs_print_info+0x12/0x12 [ 2763.303941][T17543] ? load_image+0x400/0x400 [ 2763.308441][T17543] ? __might_sleep+0xd0/0xd0 [ 2763.313025][T17543] ? __lock_acquire+0x7d10/0x7d10 [ 2763.318060][T17543] should_fail_ex+0x399/0x4d0 [ 2763.322751][T17543] should_failslab+0x5/0x20 [ 2763.327272][T17543] slab_pre_alloc_hook+0x59/0x310 [ 2763.332315][T17543] ? perf_swevent_event+0xc8/0x530 [ 2763.337540][T17543] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 2763.343269][T17543] __kmem_cache_alloc_node+0x4f/0x260 [ 2763.348656][T17543] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 2763.354400][T17543] __kmalloc+0xa0/0x240 [ 2763.358573][T17543] tomoyo_realpath_from_path+0xdf/0x5d0 [ 2763.364141][T17543] ? tomoyo_path_number_perm+0x205/0x650 [ 2763.369778][T17543] tomoyo_path_number_perm+0x22f/0x650 [ 2763.375239][T17543] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2763.380698][T17543] ? common_file_perm+0x171/0x1c0 [ 2763.385746][T17543] ? __fget_files+0x28/0x4b0 [ 2763.390427][T17543] ? __fget_files+0x28/0x4b0 [ 2763.395025][T17543] security_file_ioctl+0x6c/0xa0 [ 2763.399969][T17543] __se_sys_ioctl+0x48/0x170 [ 2763.404646][T17543] do_syscall_64+0x4c/0xa0 [ 2763.409064][T17543] ? clear_bhb_loop+0x60/0xb0 [ 2763.413743][T17543] ? clear_bhb_loop+0x60/0xb0 [ 2763.418431][T17543] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2763.424322][T17543] RIP: 0033:0x7f150d59c799 [ 2763.428734][T17543] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2763.448346][T17543] RSP: 002b:00007f150e498028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2763.456755][T17543] RAX: ffffffffffffffda RBX: 00007f150d816090 RCX: 00007f150d59c799 [ 2763.464919][T17543] RDX: 0000200000000000 RSI: 0000000000008b04 RDI: 0000000000000005 [ 2763.472886][T17543] RBP: 00007f150e498090 R08: 0000000000000000 R09: 0000000000000000 [ 2763.480855][T17543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2763.488820][T17543] R13: 00007f150d816128 R14: 00007f150d816090 R15: 00007ffc45026998 [ 2763.496797][T17543] [ 2763.513820][T17543] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2764.620640][ T4281] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 2764.630858][ T4281] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 2764.639473][ T4281] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 2764.663264][ T4281] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 2764.678415][T31368] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 2764.685896][T31368] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 2764.730737][T17569] netlink: 'syz.3.15188': attribute type 29 has an invalid length. [ 2764.936778][T17571] netlink: 13183 bytes leftover after parsing attributes in process `syz.3.15188'. [ 2765.156821][T17569] netlink: 'syz.3.15188': attribute type 29 has an invalid length. [ 2765.207392][T17570] netlink: 'syz.3.15188': attribute type 29 has an invalid length. [ 2765.346877][T31927] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2765.466125][T31927] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2765.566310][T31927] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2765.662069][T31927] batman_adv: batadv0: Removing interface: netdevsim0 [ 2765.681521][T31927] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2765.851526][T17565] chnl_net:caif_netlink_parms(): no params data found [ 2766.047026][T17595] netlink: 'syz.3.15195': attribute type 21 has an invalid length. [ 2766.084471][T17595] netlink: 'syz.3.15195': attribute type 1 has an invalid length. [ 2766.123644][T17595] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15195'. [ 2766.213562][T17598] netlink: 1047 bytes leftover after parsing attributes in process `syz.3.15195'. [ 2766.732116][T31368] Bluetooth: hci2: command 0x0409 tx timeout [ 2767.052796][T17604] netlink: 168 bytes leftover after parsing attributes in process `syz.4.15198'. [ 2767.148191][T17565] bridge0: port 1(bridge_slave_0) entered blocking state [ 2767.164279][T17565] bridge0: port 1(bridge_slave_0) entered disabled state [ 2767.179447][T17565] device bridge_slave_0 entered promiscuous mode [ 2767.205681][T17565] bridge0: port 2(bridge_slave_1) entered blocking state [ 2767.223606][T17565] bridge0: port 2(bridge_slave_1) entered disabled state [ 2767.249056][T17565] device bridge_slave_1 entered promiscuous mode [ 2767.347700][T17630] netlink: 'syz.3.15199': attribute type 29 has an invalid length. [ 2767.478196][T31927] device ip6gretap0 left promiscuous mode [ 2767.484059][T31927] : port 1(ip6gretap0) entered disabled state [ 2767.555322][T17630] netlink: 'syz.3.15199': attribute type 29 has an invalid length. [ 2767.770912][T17565] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2767.804546][T17631] netlink: 'syz.3.15199': attribute type 29 has an invalid length. [ 2767.960822][T17565] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2767.987563][T17635] netlink: 'syz.3.15199': attribute type 29 has an invalid length. [ 2768.173936][T17565] team0: Port device team_slave_0 added [ 2768.316782][T17565] team0: Port device team_slave_1 added [ 2768.401364][T17565] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2768.467954][T17565] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2768.590087][T17565] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2768.657560][T31927] syzkaller: port 1(erspan0) entered disabled state [ 2768.727406][T31927] device erspan0 left promiscuous mode [ 2768.749492][T31927] syzkaller: port 1(erspan0) entered disabled state [ 2768.808223][T31368] Bluetooth: hci2: command 0x041b tx timeout [ 2768.821030][T17672] netlink: 'syz.4.15210': attribute type 21 has an invalid length. [ 2768.849142][T17672] netlink: 132 bytes leftover after parsing attributes in process `syz.4.15210'. [ 2768.861970][T17565] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2768.872481][T17565] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2768.901864][T17565] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2768.913427][T17679] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.15210'. [ 2768.923074][T17679] bridge_slave_1: default FDB implementation only supports local addresses [ 2769.093434][T17565] device hsr_slave_0 entered promiscuous mode [ 2769.109171][T17565] device hsr_slave_1 entered promiscuous mode [ 2769.126029][T17565] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2769.149234][T17565] Cannot create hsr debugfs directory [ 2769.242025][T17691] syzkaller: port 1(erspan0) entered blocking state [ 2769.255095][T17691] syzkaller: port 1(erspan0) entered disabled state [ 2769.263594][T17691] device erspan0 entered promiscuous mode [ 2769.308945][T17691] syzkaller: port 1(erspan0) entered blocking state [ 2769.315683][T17691] syzkaller: port 1(erspan0) entered forwarding state [ 2770.035634][T31927] bond0: (slave »»»»»»): Releasing backup interface [ 2770.047647][T31927] bond0: (slave »»»»»»): the permanent HWaddr of slave - 08:02:11:00:00:00 - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 2770.143304][T17722] validate_nla: 1 callbacks suppressed [ 2770.143333][T17722] netlink: 'syz.0.15227': attribute type 21 has an invalid length. [ 2770.187057][T17722] netlink: 132 bytes leftover after parsing attributes in process `syz.0.15227'. [ 2770.234928][T17722] netlink: 28 bytes leftover after parsing attributes in process `syz.0.15227'. [ 2770.352240][T31927] device hsr_slave_0 left promiscuous mode [ 2770.381182][T31927] device hsr_slave_1 left promiscuous mode [ 2770.399203][T31927] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2770.424251][T31927] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2770.439576][T31927] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2770.457898][T31927] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2770.465716][T31927] batman_adv: batadv0: Interface deactivated: vlan1 [ 2770.486733][T31927] batman_adv: batadv0: Removing interface: vlan1 [ 2770.545208][T31927] device veth1_vlan left promiscuous mode [ 2770.554223][T31927] device veth0_vlan left promiscuous mode [ 2770.888128][T22314] Bluetooth: hci2: command 0x040f tx timeout [ 2771.964654][T31927] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2772.492171][T31927] bond0 (unregistering): Released all slaves [ 2772.624320][T17727] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.15227'. [ 2772.787957][T17753] netlink: 'syz.3.15236': attribute type 23 has an invalid length. [ 2772.977984][T31368] Bluetooth: hci2: command 0x0419 tx timeout [ 2773.199886][T17565] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2773.251770][T17565] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2773.279421][T17565] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2773.310900][T17565] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2773.675396][T17565] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2773.720896][T17781] FAULT_INJECTION: forcing a failure. [ 2773.720896][T17781] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2773.747609][ T6582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2773.777720][ T6582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2773.790174][T17565] 8021q: adding VLAN 0 to HW filter on device team0 [ 2773.818828][T17781] CPU: 0 PID: 17781 Comm: syz.0.15241 Not tainted syzkaller #0 [ 2773.826442][T17781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2773.827125][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2773.836505][T17781] Call Trace: [ 2773.836525][T17781] [ 2773.836535][T17781] dump_stack_lvl+0x188/0x24e [ 2773.836565][T17781] ? show_regs_print_info+0x12/0x12 [ 2773.836586][T17781] ? load_image+0x400/0x400 [ 2773.836606][T17781] ? __lock_acquire+0x7d10/0x7d10 [ 2773.836628][T17781] ? lockdep_hardirqs_on+0x94/0x140 [ 2773.836648][T17781] should_fail_ex+0x399/0x4d0 [ 2773.836667][T17781] _copy_from_user+0x2c/0x170 [ 2773.836688][T17781] __sys_bpf+0x2ea/0x780 [ 2773.866118][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2773.870380][T17781] ? bpf_link_show_fdinfo+0x380/0x380 [ 2773.870423][T17781] ? lock_chain_count+0x20/0x20 [ 2773.870450][T17781] __x64_sys_bpf+0x78/0x90 [ 2773.870471][T17781] do_syscall_64+0x4c/0xa0 [ 2773.870492][T17781] ? clear_bhb_loop+0x60/0xb0 [ 2773.870511][T17781] ? clear_bhb_loop+0x60/0xb0 [ 2773.870533][T17781] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2773.870553][T17781] RIP: 0033:0x7f150d59c799 [ 2773.870571][T17781] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2773.870587][T17781] RSP: 002b:00007f150e4b9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2773.870605][T17781] RAX: ffffffffffffffda RBX: 00007f150d815fa0 RCX: 00007f150d59c799 [ 2773.870619][T17781] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 2773.870631][T17781] RBP: 00007f150e4b9090 R08: 0000000000000000 R09: 0000000000000000 [ 2773.870642][T17781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2773.870654][T17781] R13: 00007f150d816038 R14: 00007f150d815fa0 R15: 00007ffc45026998 [ 2773.870679][T17781] [ 2774.019922][T16375] bridge0: port 1(bridge_slave_0) entered blocking state [ 2774.027070][T16375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2774.077212][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2774.100574][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2774.118561][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2774.137107][T16375] bridge0: port 2(bridge_slave_1) entered blocking state [ 2774.144351][T16375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2774.174749][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2774.194044][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2774.274985][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2774.291200][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2774.315197][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2774.354114][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2774.374155][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2774.425684][T17804] netlink: 16098 bytes leftover after parsing attributes in process `syz.0.15247'. [ 2774.457196][T17565] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2774.497577][T17565] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2774.520177][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2774.536899][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2774.579787][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2774.614144][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2774.686488][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2775.334365][T17830] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 2775.343832][T17830] syzkaller0: linktype set to 769 [ 2775.368555][T17830] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 2775.378801][T17830] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 2775.436102][T17830] netlink: 'syz.4.15253': attribute type 10 has an invalid length. [ 2775.468017][T17830] netlink: 40 bytes leftover after parsing attributes in process `syz.4.15253'. [ 2775.507623][T17830] device veth0_vlan left promiscuous mode [ 2775.522788][T17842] netlink: 'syz.3.15255': attribute type 28 has an invalid length. [ 2775.537346][T17830] device veth0_vlan entered promiscuous mode [ 2775.551785][T17842] netlink: 'syz.3.15255': attribute type 29 has an invalid length. [ 2775.581031][T17842] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15255'. [ 2775.593982][T17830] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 2775.651963][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2775.666445][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2775.694699][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2775.806474][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2775.841135][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2775.973368][T17565] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2776.102096][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2776.129542][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2776.209714][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2776.233386][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2776.296877][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2776.316074][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2776.351764][T17565] device veth0_vlan entered promiscuous mode [ 2776.376173][T17866] device syzkaller0 entered promiscuous mode [ 2776.422851][T17565] device veth1_vlan entered promiscuous mode [ 2776.476970][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2776.512732][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 2776.689810][ T6557] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2776.740292][ T6557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2776.799178][ T6557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2776.845580][T17565] device veth0_macvtap entered promiscuous mode [ 2776.890537][T17565] device veth1_macvtap entered promiscuous mode [ 2776.958740][T17885] netlink: 132 bytes leftover after parsing attributes in process `syz.2.15264'. [ 2777.040236][T17565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2777.082411][T17565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2777.107164][T17565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2777.136408][T17565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2777.156867][T17565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2777.181965][T17565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2777.228840][T17565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2777.257289][T17565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2777.280371][T17565] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2778.059215][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2778.092357][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2778.104553][T17565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2778.123964][T17565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2778.137969][T17565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2778.156580][T17565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2778.168201][T17565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2778.185782][T17565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2778.196223][T17565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2778.214052][T17565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2778.272200][T17565] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2778.283705][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2778.329715][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2778.361728][T17565] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2778.386547][T17565] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2778.422156][T17565] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2778.451575][T17565] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2778.655035][T16375] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2778.688150][T16375] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2778.743174][T16375] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2778.815097][T16375] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2778.847806][T16375] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2778.876088][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2778.916176][T17941] netlink: 'syz.4.15278': attribute type 3 has an invalid length. [ 2778.939862][T17941] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.15278'. [ 2779.972390][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 2779.978827][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 2781.259978][T17988] device syzkaller0 entered promiscuous mode [ 2784.405023][T18013] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 2784.411445][T18013] syzkaller0: linktype set to 769 [ 2784.419829][T18017] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 2784.436053][T18019] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 2784.443416][T18024] netlink: 'syz.3.15294': attribute type 10 has an invalid length. [ 2784.488372][T18024] netlink: 40 bytes leftover after parsing attributes in process `syz.3.15294'. [ 2784.532621][T18024] bridge0: port 3(veth0_vlan) entered blocking state [ 2784.538443][T18027] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.15298'. [ 2784.547969][T18024] bridge0: port 3(veth0_vlan) entered disabled state [ 2784.589519][T18024] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 2784.614307][T18027] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.15298'. [ 2784.631173][T18031] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.15298'. [ 2784.662432][T18027] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.15298'. [ 2784.743848][T18037] netlink: 'syz.4.15300': attribute type 10 has an invalid length. [ 2784.764853][T18037] netlink: 65015 bytes leftover after parsing attributes in process `syz.4.15300'. [ 2784.906473][T18043] FAULT_INJECTION: forcing a failure. [ 2784.906473][T18043] name failslab, interval 1, probability 0, space 0, times 0 [ 2784.946018][T18043] CPU: 0 PID: 18043 Comm: syz.0.15303 Not tainted syzkaller #0 [ 2784.953982][T18043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2784.964060][T18043] Call Trace: [ 2784.967366][T18043] [ 2784.970324][T18043] dump_stack_lvl+0x188/0x24e [ 2784.975039][T18043] ? show_regs_print_info+0x12/0x12 [ 2784.975175][T18045] netlink: 'syz.2.15304': attribute type 13 has an invalid length. [ 2784.980255][T18043] ? load_image+0x400/0x400 [ 2784.980289][T18043] ? __might_sleep+0xd0/0xd0 [ 2784.980306][T18043] ? __lock_acquire+0x7d10/0x7d10 [ 2784.980330][T18043] should_fail_ex+0x399/0x4d0 [ 2784.980352][T18043] should_failslab+0x5/0x20 [ 2784.980374][T18043] slab_pre_alloc_hook+0x59/0x310 [ 2784.980394][T18043] ? tomoyo_encode+0x27e/0x540 [ 2784.980416][T18043] __kmem_cache_alloc_node+0x4f/0x260 [ 2784.980439][T18043] ? tomoyo_encode+0x27e/0x540 [ 2784.980460][T18043] __kmalloc+0xa0/0x240 [ 2784.980486][T18043] tomoyo_encode+0x27e/0x540 [ 2784.980513][T18043] tomoyo_realpath_from_path+0x58e/0x5d0 [ 2784.980544][T18043] ? tomoyo_path_number_perm+0x205/0x650 [ 2784.980567][T18043] tomoyo_path_number_perm+0x22f/0x650 [ 2784.980591][T18043] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2784.980613][T18043] ? ksys_write+0x1c0/0x250 [ 2784.994272][T18045] netlink: 24643 bytes leftover after parsing attributes in process `syz.2.15304'. [ 2784.997647][T18043] ? common_file_perm+0x171/0x1c0 [ 2784.997704][T18043] ? __fget_files+0x28/0x4b0 [ 2784.997727][T18043] ? __fget_files+0x28/0x4b0 [ 2784.997756][T18043] security_file_ioctl+0x6c/0xa0 [ 2784.997781][T18043] __se_sys_ioctl+0x48/0x170 [ 2784.997806][T18043] do_syscall_64+0x4c/0xa0 [ 2784.997827][T18043] ? clear_bhb_loop+0x60/0xb0 [ 2784.997848][T18043] ? clear_bhb_loop+0x60/0xb0 [ 2784.997867][T18043] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2784.997885][T18043] RIP: 0033:0x7f150d59c799 [ 2784.997902][T18043] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2784.997919][T18043] RSP: 002b:00007f150e4b9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2784.997941][T18043] RAX: ffffffffffffffda RBX: 00007f150d815fa0 RCX: 00007f150d59c799 [ 2784.997954][T18043] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000008 [ 2784.997966][T18043] RBP: 00007f150e4b9090 R08: 0000000000000000 R09: 0000000000000000 [ 2784.997978][T18043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2784.997990][T18043] R13: 00007f150d816038 R14: 00007f150d815fa0 R15: 00007ffc45026998 [ 2784.998018][T18043] [ 2785.093529][T18043] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2785.224354][T18050] netlink: 'syz.2.15304': attribute type 10 has an invalid length. [ 2785.269162][T18050] bond0: (slave bond_slave_0): Releasing backup interface [ 2785.476320][T18056] netlink: 'syz.4.15307': attribute type 10 has an invalid length. [ 2785.540891][T18056] device bond_slave_0 left promiscuous mode [ 2785.579584][T18056] device bond_slave_1 left promiscuous mode [ 2785.644910][T18061] netlink: 'syz.4.15307': attribute type 10 has an invalid length. [ 2785.727913][T18061] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2785.785613][T18061] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2785.856076][T18061] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 2787.032565][T18097] netlink: 'syz.1.15317': attribute type 10 has an invalid length. [ 2787.069286][T18095] netlink: 44 bytes leftover after parsing attributes in process `syz.3.15318'. [ 2787.216739][T18097] team0 (unregistering): Port device team_slave_0 removed [ 2787.243873][T18097] team0 (unregistering): Port device team_slave_1 removed [ 2787.275321][T18089] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 2787.284293][T18089] syzkaller0: linktype set to 769 [ 2787.295794][T18102] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 2787.305289][T18104] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 2787.321698][T18096] netlink: 'syz.0.15315': attribute type 10 has an invalid length. [ 2787.331747][T18096] netlink: 40 bytes leftover after parsing attributes in process `syz.0.15315'. [ 2787.341990][T18096] bridge0: port 3(veth0_vlan) entered blocking state [ 2787.391793][T18096] bridge0: port 3(veth0_vlan) entered disabled state [ 2787.419590][T18096] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 2787.662532][T18115] netlink: 'syz.4.15323': attribute type 13 has an invalid length. [ 2787.706539][T18115] netlink: 24643 bytes leftover after parsing attributes in process `syz.4.15323'. [ 2787.754513][T18115] netlink: 'syz.4.15323': attribute type 10 has an invalid length. [ 2787.792155][T18115] bond0: (slave bond_slave_0): Releasing backup interface [ 2788.213900][T18137] syzkaller: port 1(erspan0) entered blocking state [ 2788.236988][T18137] syzkaller: port 1(erspan0) entered disabled state [ 2788.291496][T18137] device erspan0 entered promiscuous mode [ 2788.327064][T18137] syzkaller: port 1(erspan0) entered blocking state [ 2788.333867][T18137] syzkaller: port 1(erspan0) entered forwarding state [ 2789.273120][T18158] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2789.305610][T18158] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2789.339283][T18158] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 2789.577036][T18168] validate_nla: 3 callbacks suppressed [ 2789.577073][T18168] netlink: 'syz.0.15340': attribute type 13 has an invalid length. [ 2789.647029][T18168] __nla_validate_parse: 1 callbacks suppressed [ 2789.647076][T18168] netlink: 24643 bytes leftover after parsing attributes in process `syz.0.15340'. [ 2789.696775][T18168] netlink: 'syz.0.15340': attribute type 10 has an invalid length. [ 2789.709739][T18168] bond0: (slave bond_slave_0): Releasing backup interface [ 2789.917974][T18179] netlink: 'syz.3.15344': attribute type 2 has an invalid length. [ 2789.926065][T18179] netlink: 10 bytes leftover after parsing attributes in process `syz.3.15344'. [ 2789.955703][T18181] netlink: 'syz.3.15344': attribute type 11 has an invalid length. [ 2790.015971][T18181] netlink: 128124 bytes leftover after parsing attributes in process `syz.3.15344'. [ 2790.339433][T18186] device syzkaller0 entered promiscuous mode [ 2790.697430][T18196] netlink: 'syz.3.15350': attribute type 21 has an invalid length. [ 2793.096902][T18194] netlink: 'syz.0.15349': attribute type 10 has an invalid length. [ 2793.112541][T18194] team0: Port device syz_tun added [ 2793.133226][T18205] netlink: 16186 bytes leftover after parsing attributes in process `syz.3.15354'. [ 2793.304930][T18219] netlink: 'syz.4.15356': attribute type 6 has an invalid length. [ 2793.327522][T18213] IPv6: Can't replace route, no match found [ 2793.334983][T18219] netlink: 1034 bytes leftover after parsing attributes in process `syz.4.15356'. [ 2793.351653][T18220] netlink: 'syz.3.15358': attribute type 13 has an invalid length. [ 2793.401058][T18220] netlink: 24643 bytes leftover after parsing attributes in process `syz.3.15358'. [ 2793.490315][T18227] netlink: 'syz.3.15358': attribute type 10 has an invalid length. [ 2793.577661][T18227] bond0: (slave bond_slave_0): Releasing backup interface [ 2794.053561][T18247] netlink: 'syz.2.15366': attribute type 10 has an invalid length. [ 2794.245703][T18247] team0: Port device syz_tun added [ 2795.015022][T18273] netlink: 'syz.4.15374': attribute type 29 has an invalid length. [ 2795.104991][T18273] netlink: 'syz.4.15374': attribute type 16 has an invalid length. [ 2795.137287][T18273] netlink: 152 bytes leftover after parsing attributes in process `syz.4.15374'. [ 2795.236698][T18274] netlink: 'syz.0.15373': attribute type 1 has an invalid length. [ 2795.339516][T18274] netlink: 105120 bytes leftover after parsing attributes in process `syz.0.15373'. [ 2795.499896][T18286] netlink: 'syz.1.15377': attribute type 39 has an invalid length. [ 2797.245209][T18301] netlink: 'syz.4.15382': attribute type 10 has an invalid length. [ 2797.413491][T18301] team0: Port device syz_tun added [ 2799.495203][T18341] netlink: 60 bytes leftover after parsing attributes in process `syz.3.15400'. [ 2799.512334][T18341] netlink: 60 bytes leftover after parsing attributes in process `syz.3.15400'. [ 2799.582190][T18352] FAULT_INJECTION: forcing a failure. [ 2799.582190][T18352] name failslab, interval 1, probability 0, space 0, times 0 [ 2799.609462][T18353] netlink: 60 bytes leftover after parsing attributes in process `syz.3.15400'. [ 2799.630273][T18352] CPU: 0 PID: 18352 Comm: syz.1.15402 Not tainted syzkaller #0 [ 2799.637974][T18352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2799.648056][T18352] Call Trace: [ 2799.651356][T18352] [ 2799.654481][T18352] dump_stack_lvl+0x188/0x24e [ 2799.659205][T18352] ? show_regs_print_info+0x12/0x12 [ 2799.664453][T18352] ? load_image+0x400/0x400 [ 2799.669000][T18352] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2799.675024][T18352] should_fail_ex+0x399/0x4d0 [ 2799.679765][T18352] should_failslab+0x5/0x20 [ 2799.684294][T18352] slab_pre_alloc_hook+0x59/0x310 [ 2799.689548][T18352] kmem_cache_alloc+0x56/0x2f0 [ 2799.694343][T18352] ? __build_skb+0x2a/0x3c0 [ 2799.698893][T18352] __build_skb+0x2a/0x3c0 [ 2799.703265][T18352] build_skb+0x1e/0x230 [ 2799.707458][T18352] bpf_prog_test_run_skb+0x37e/0x12a0 [ 2799.712865][T18352] ? __fget_files+0x28/0x4b0 [ 2799.717490][T18352] ? __fget_files+0x43d/0x4b0 [ 2799.722221][T18352] ? cpu_online+0xa0/0xa0 [ 2799.726582][T18352] bpf_prog_test_run+0x31e/0x390 [ 2799.731554][T18352] __sys_bpf+0x62b/0x780 [ 2799.735817][T18352] ? bpf_link_show_fdinfo+0x380/0x380 [ 2799.741202][T18352] ? lock_chain_count+0x20/0x20 [ 2799.746167][T18352] __x64_sys_bpf+0x78/0x90 [ 2799.750579][T18352] do_syscall_64+0x4c/0xa0 [ 2799.754993][T18352] ? clear_bhb_loop+0x60/0xb0 [ 2799.759662][T18352] ? clear_bhb_loop+0x60/0xb0 [ 2799.764336][T18352] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2799.770224][T18352] RIP: 0033:0x7f4732b9c799 [ 2799.774631][T18352] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2799.794238][T18352] RSP: 002b:00007f4733a94028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2799.802910][T18352] RAX: ffffffffffffffda RBX: 00007f4732e15fa0 RCX: 00007f4732b9c799 [ 2799.810904][T18352] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 2799.818873][T18352] RBP: 00007f4733a94090 R08: 0000000000000000 R09: 0000000000000000 [ 2799.826839][T18352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2799.834894][T18352] R13: 00007f4732e16038 R14: 00007f4732e15fa0 R15: 00007ffc36613098 [ 2799.842874][T18352] [ 2799.916393][T18346] IPv6: sit1: Disabled Multicast RS [ 2800.261096][T18356] device syzkaller0 entered promiscuous mode [ 2800.471828][T18378] netlink: 'syz.1.15408': attribute type 3 has an invalid length. [ 2800.492454][T18378] netlink: 132 bytes leftover after parsing attributes in process `syz.1.15408'. [ 2803.909602][T18394] sctp: [Deprecated]: syz.2.15413 (pid 18394) Use of int in maxseg socket option. [ 2803.909602][T18394] Use struct sctp_assoc_value instead [ 2808.692554][T18398] device veth1_virt_wifi entered promiscuous mode [ 2808.825440][T18407] sctp: [Deprecated]: syz.2.15417 (pid 18407) Use of int in maxseg socket option. [ 2808.825440][T18407] Use struct sctp_assoc_value instead [ 2808.862606][T18407] FAULT_INJECTION: forcing a failure. [ 2808.862606][T18407] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2808.876513][T18407] CPU: 1 PID: 18407 Comm: syz.2.15417 Not tainted syzkaller #0 [ 2808.884090][T18407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2808.894167][T18407] Call Trace: [ 2808.897466][T18407] [ 2808.900419][T18407] dump_stack_lvl+0x188/0x24e [ 2808.905127][T18407] ? show_regs_print_info+0x12/0x12 [ 2808.910356][T18407] ? load_image+0x400/0x400 [ 2808.914897][T18407] ? __lock_acquire+0x7d10/0x7d10 [ 2808.919951][T18407] ? snprintf+0xe5/0x140 [ 2808.924215][T18407] should_fail_ex+0x399/0x4d0 [ 2808.928916][T18407] _copy_to_user+0x2c/0x130 [ 2808.933452][T18407] simple_read_from_buffer+0xe3/0x150 [ 2808.938875][T18407] proc_fail_nth_read+0x1a6/0x220 [ 2808.943939][T18407] ? proc_fault_inject_write+0x310/0x310 [ 2808.949617][T18407] ? fsnotify_perm+0x248/0x550 [ 2808.954407][T18407] ? proc_fault_inject_write+0x310/0x310 [ 2808.960066][T18407] vfs_read+0x2de/0xa00 [ 2808.964738][T18407] ? kernel_read+0x1e0/0x1e0 [ 2808.969360][T18407] ? __fget_files+0x28/0x4b0 [ 2808.973981][T18407] ? __fget_files+0x28/0x4b0 [ 2808.978599][T18407] ? __fget_files+0x43d/0x4b0 [ 2808.983300][T18407] ? __fdget_pos+0x2ae/0x360 [ 2808.987905][T18407] ? ksys_read+0x71/0x250 [ 2808.992266][T18407] ksys_read+0x14c/0x250 [ 2808.996511][T18407] ? vfs_write+0xa30/0xa30 [ 2809.000928][T18407] ? lockdep_hardirqs_on+0x94/0x140 [ 2809.006148][T18407] do_syscall_64+0x4c/0xa0 [ 2809.010573][T18407] ? clear_bhb_loop+0x60/0xb0 [ 2809.015250][T18407] ? clear_bhb_loop+0x60/0xb0 [ 2809.019936][T18407] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2809.025830][T18407] RIP: 0033:0x7fc091d5cfce [ 2809.030244][T18407] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2809.049946][T18407] RSP: 002b:00007fc092c1afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2809.058361][T18407] RAX: ffffffffffffffda RBX: 00007fc092c1b6c0 RCX: 00007fc091d5cfce [ 2809.066325][T18407] RDX: 000000000000000f RSI: 00007fc092c1b0a0 RDI: 0000000000000005 [ 2809.074460][T18407] RBP: 00007fc092c1b090 R08: 0000000000000000 R09: 0000000000000000 [ 2809.082421][T18407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2809.090383][T18407] R13: 00007fc092016038 R14: 00007fc092015fa0 R15: 00007fff41a61ff8 [ 2809.098364][T18407] [ 2809.137381][T18415] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2809.178256][T18415] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2809.232221][T18415] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2809.277998][T18415] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2809.377941][T18415] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2809.417905][T18415] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2809.481158][T18415] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2809.528051][T18415] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2809.594253][T18415] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2809.607254][T18415] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2812.694814][T18453] netlink: 10 bytes leftover after parsing attributes in process `syz.0.15431'. [ 2812.730072][T18453] netlink: 132 bytes leftover after parsing attributes in process `syz.0.15431'. [ 2814.137827][T18481] net_ratelimit: 25315 callbacks suppressed [ 2814.137845][T18481] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2814.160183][T18481] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2814.174457][T18481] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2814.187771][T18481] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2814.204783][T18481] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2814.215005][T18481] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2814.232480][T18481] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2814.243996][T18481] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2814.260670][T18481] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2814.278306][T18481] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2816.457711][T18498] netlink: 'syz.2.15447': attribute type 27 has an invalid length. [ 2816.486283][T18498] netlink: 164 bytes leftover after parsing attributes in process `syz.2.15447'. [ 2816.501329][T18495] netlink: 'syz.1.15446': attribute type 10 has an invalid length. [ 2816.516992][T18495] netlink: 164 bytes leftover after parsing attributes in process `syz.1.15446'. [ 2817.051938][T18519] netlink: 'syz.3.15454': attribute type 2 has an invalid length. [ 2817.089537][T18519] netlink: 'syz.3.15454': attribute type 1 has an invalid length. [ 2817.141029][T18519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2817.333337][T18528] netlink: 14719 bytes leftover after parsing attributes in process `syz.0.15455'. [ 2819.643579][T18540] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15463'. [ 2819.668142][T18540] FAULT_INJECTION: forcing a failure. [ 2819.668142][T18540] name failslab, interval 1, probability 0, space 0, times 0 [ 2819.688722][T18540] CPU: 1 PID: 18540 Comm: syz.4.15463 Not tainted syzkaller #0 [ 2819.696331][T18540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2819.706494][T18540] Call Trace: [ 2819.709800][T18540] [ 2819.712835][T18540] dump_stack_lvl+0x188/0x24e [ 2819.717538][T18540] ? show_regs_print_info+0x12/0x12 [ 2819.722848][T18540] ? load_image+0x400/0x400 [ 2819.727394][T18540] ? __might_sleep+0xd0/0xd0 [ 2819.732009][T18540] ? __lock_acquire+0x7d10/0x7d10 [ 2819.737071][T18540] should_fail_ex+0x399/0x4d0 [ 2819.741788][T18540] should_failslab+0x5/0x20 [ 2819.746329][T18540] slab_pre_alloc_hook+0x59/0x310 [ 2819.751398][T18540] ? fib_nl2rule+0x36a/0x1b20 [ 2819.756118][T18540] __kmem_cache_alloc_node+0x4f/0x260 [ 2819.761524][T18540] ? fib_nl2rule+0x36a/0x1b20 [ 2819.766235][T18540] __kmalloc+0xa0/0x240 [ 2819.770426][T18540] fib_nl2rule+0x36a/0x1b20 [ 2819.774958][T18540] ? lockdep_hardirqs_on+0x94/0x140 [ 2819.780197][T18540] ? fib_nl_newrule+0x1db0/0x1db0 [ 2819.785360][T18540] ? __nla_parse+0x3c/0x50 [ 2819.789798][T18540] fib_nl_newrule+0x380/0x1db0 [ 2819.794573][T18540] ? __mutex_lock+0x806/0xaf0 [ 2819.799255][T18540] ? __lock_acquire+0x7d10/0x7d10 [ 2819.804277][T18540] ? do_raw_spin_lock+0x128/0x2f0 [ 2819.809306][T18540] ? fib_rules_seq_read+0xf0/0xf0 [ 2819.814325][T18540] ? do_raw_spin_unlock+0x11d/0x230 [ 2819.819537][T18540] ? rtnetlink_rcv_msg+0x226/0xfc0 [ 2819.824650][T18540] ? rtnetlink_rcv_msg+0x226/0xfc0 [ 2819.829758][T18540] ? fib_rules_seq_read+0xf0/0xf0 [ 2819.834777][T18540] rtnetlink_rcv_msg+0x87c/0xfc0 [ 2819.839726][T18540] ? rtnetlink_bind+0x80/0x80 [ 2819.844406][T18540] ? __local_bh_enable_ip+0x13e/0x1c0 [ 2819.849788][T18540] ? _local_bh_enable+0xa0/0xa0 [ 2819.854810][T18540] ? __dev_queue_xmit+0x26b/0x37c0 [ 2819.859914][T18540] ? __dev_queue_xmit+0x26b/0x37c0 [ 2819.865019][T18540] ? __dev_queue_xmit+0x1cd2/0x37c0 [ 2819.870306][T18540] ? __dev_queue_xmit+0x26b/0x37c0 [ 2819.875522][T18540] ? ref_tracker_free+0x68c/0x840 [ 2819.880564][T18540] ? __copy_skb_header+0x3ba/0x4f0 [ 2819.885700][T18540] ? refcount_inc+0x70/0x70 [ 2819.890220][T18540] ? memcpy+0x3c/0x60 [ 2819.894212][T18540] ? __copy_skb_header+0x3ba/0x4f0 [ 2819.899324][T18540] ? __skb_clone+0x480/0x790 [ 2819.903938][T18540] netlink_rcv_skb+0x1fb/0x450 [ 2819.908718][T18540] ? rtnetlink_bind+0x80/0x80 [ 2819.913402][T18540] ? netlink_ack+0x1170/0x1170 [ 2819.918178][T18540] ? netlink_deliver_tap+0x2e/0x1b0 [ 2819.923384][T18540] netlink_unicast+0x74d/0x8d0 [ 2819.928164][T18540] netlink_sendmsg+0x8ad/0xbd0 [ 2819.932931][T18540] ? netlink_getsockopt+0x550/0x550 [ 2819.938128][T18540] ? aa_sock_msg_perm+0x94/0x150 [ 2819.943281][T18540] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2819.948582][T18540] ? security_socket_sendmsg+0x7c/0xa0 [ 2819.954050][T18540] ? netlink_getsockopt+0x550/0x550 [ 2819.959249][T18540] ____sys_sendmsg+0x5be/0x970 [ 2819.964021][T18540] ? __sys_sendmsg_sock+0x30/0x30 [ 2819.969049][T18540] ? __import_iovec+0x315/0x500 [ 2819.973900][T18540] ? import_iovec+0x6f/0xa0 [ 2819.978396][T18540] ___sys_sendmsg+0x2a2/0x360 [ 2819.983079][T18540] ? __sys_sendmsg+0x290/0x290 [ 2819.987856][T18540] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 2819.993595][T18540] __se_sys_sendmsg+0x1bb/0x2a0 [ 2819.998444][T18540] ? __x64_sys_sendmsg+0x80/0x80 [ 2820.003400][T18540] ? syscall_enter_from_user_mode+0x2a/0x80 [ 2820.009293][T18540] do_syscall_64+0x4c/0xa0 [ 2820.013704][T18540] ? clear_bhb_loop+0x60/0xb0 [ 2820.018373][T18540] ? clear_bhb_loop+0x60/0xb0 [ 2820.023084][T18540] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2820.028983][T18540] RIP: 0033:0x7fe02159c799 [ 2820.033395][T18540] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2820.052999][T18540] RSP: 002b:00007fe0223a1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2820.061411][T18540] RAX: ffffffffffffffda RBX: 00007fe021815fa0 RCX: 00007fe02159c799 [ 2820.069385][T18540] RDX: 0000000004020804 RSI: 0000200000000000 RDI: 0000000000000003 [ 2820.077350][T18540] RBP: 00007fe0223a1090 R08: 0000000000000000 R09: 0000000000000000 [ 2820.085309][T18540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2820.093291][T18540] R13: 00007fe021816038 R14: 00007fe021815fa0 R15: 00007ffdb0b5ace8 [ 2820.101279][T18540] [ 2820.354777][T18542] mac80211_hwsim hwsim353 »»»»»»: renamed from wlan0 [ 2821.494428][T18578] netlink: 'syz.2.15476': attribute type 10 has an invalid length. [ 2821.558138][T18578] netlink: 164 bytes leftover after parsing attributes in process `syz.2.15476'. [ 2821.674772][T18584] mac80211_hwsim hwsim355 »»»»»»: renamed from wlan0 [ 2822.286252][T18611] net_ratelimit: 29887 callbacks suppressed [ 2822.286274][T18611] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2822.322788][T18611] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2822.343370][T18611] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2822.371605][T18611] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2822.382189][T18611] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2822.395607][T18611] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2822.408703][T18611] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2822.420744][T18611] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2822.431162][T18611] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2822.441502][T18611] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2823.126649][T18613] netlink: 4 bytes leftover after parsing attributes in process `syz.3.15488'. [ 2824.502435][T18622] netlink: 14719 bytes leftover after parsing attributes in process `syz.4.15493'. [ 2826.648461][T18625] netlink: 'syz.3.15494': attribute type 10 has an invalid length. [ 2826.656411][T18625] netlink: 164 bytes leftover after parsing attributes in process `syz.3.15494'. [ 2827.097936][T18644] netlink: 'syz.1.15496': attribute type 10 has an invalid length. [ 2827.354164][T18644] netlink: 55 bytes leftover after parsing attributes in process `syz.1.15496'. [ 2830.098173][T18650] netlink: 132 bytes leftover after parsing attributes in process `syz.4.15499'. [ 2832.192569][T18702] netlink: 188 bytes leftover after parsing attributes in process `syz.3.15514'. [ 2832.321630][T18702] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15514'. [ 2833.936064][T18742] net_ratelimit: 12804 callbacks suppressed [ 2833.936084][T18742] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2834.037124][T18742] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2834.125472][T18742] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2834.201678][T18742] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2834.242489][T18742] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2834.277930][T18742] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2834.310892][T18742] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2834.341548][T18742] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2834.358051][T18742] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2834.387979][T18742] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2838.247899][T22314] Bluetooth: hci3: command 0x0406 tx timeout [ 2838.646395][T18782] device wg2 entered promiscuous mode [ 2838.958137][T18799] net_ratelimit: 16672 callbacks suppressed [ 2838.958159][T18799] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2838.995000][T18799] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2839.012827][T18804] netlink: 'syz.1.15548': attribute type 29 has an invalid length. [ 2839.019305][T18799] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2839.038358][T18799] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2839.071119][T18799] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2839.076581][T18804] netlink: 'syz.1.15548': attribute type 29 has an invalid length. [ 2839.112093][T18799] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2839.158000][T18799] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2839.190689][T18799] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2839.214671][T18799] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2839.234211][T18799] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2841.294235][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 2841.300733][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 2842.351132][T18833] FAULT_INJECTION: forcing a failure. [ 2842.351132][T18833] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2842.404938][T18833] CPU: 0 PID: 18833 Comm: syz.2.15555 Not tainted syzkaller #0 [ 2842.412541][T18833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2842.422614][T18833] Call Trace: [ 2842.425894][T18833] [ 2842.428823][T18833] dump_stack_lvl+0x188/0x24e [ 2842.433506][T18833] ? show_regs_print_info+0x12/0x12 [ 2842.438705][T18833] ? load_image+0x400/0x400 [ 2842.443204][T18833] ? __lock_acquire+0x7d10/0x7d10 [ 2842.448227][T18833] ? snprintf+0xe5/0x140 [ 2842.452470][T18833] should_fail_ex+0x399/0x4d0 [ 2842.457146][T18833] _copy_to_user+0x2c/0x130 [ 2842.461647][T18833] simple_read_from_buffer+0xe3/0x150 [ 2842.467024][T18833] proc_fail_nth_read+0x1a6/0x220 [ 2842.472047][T18833] ? proc_fault_inject_write+0x310/0x310 [ 2842.477674][T18833] ? fsnotify_perm+0x248/0x550 [ 2842.482433][T18833] ? proc_fault_inject_write+0x310/0x310 [ 2842.488061][T18833] vfs_read+0x2de/0xa00 [ 2842.492220][T18833] ? kernel_read+0x1e0/0x1e0 [ 2842.496805][T18833] ? __fget_files+0x28/0x4b0 [ 2842.501399][T18833] ? __fget_files+0x28/0x4b0 [ 2842.505989][T18833] ? __fget_files+0x43d/0x4b0 [ 2842.510673][T18833] ? __fdget_pos+0x2ae/0x360 [ 2842.515263][T18833] ? ksys_read+0x71/0x250 [ 2842.519691][T18833] ksys_read+0x14c/0x250 [ 2842.523938][T18833] ? vfs_write+0xa30/0xa30 [ 2842.528354][T18833] ? lockdep_hardirqs_on+0x94/0x140 [ 2842.533551][T18833] do_syscall_64+0x4c/0xa0 [ 2842.537973][T18833] ? clear_bhb_loop+0x60/0xb0 [ 2842.542648][T18833] ? clear_bhb_loop+0x60/0xb0 [ 2842.547322][T18833] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2842.553305][T18833] RIP: 0033:0x7fc091d5cfce [ 2842.557714][T18833] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2842.577443][T18833] RSP: 002b:00007fc092c1afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2842.585858][T18833] RAX: ffffffffffffffda RBX: 00007fc092c1b6c0 RCX: 00007fc091d5cfce [ 2842.593826][T18833] RDX: 000000000000000f RSI: 00007fc092c1b0a0 RDI: 0000000000000006 [ 2842.601790][T18833] RBP: 00007fc092c1b090 R08: 0000000000000000 R09: 0000000000000000 [ 2842.609760][T18833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2842.617729][T18833] R13: 00007fc092016038 R14: 00007fc092015fa0 R15: 00007fff41a61ff8 [ 2842.625721][T18833] [ 2842.683872][T18840] netlink: 132 bytes leftover after parsing attributes in process `syz.1.15558'. [ 2843.985135][T18856] net_ratelimit: 25639 callbacks suppressed [ 2843.985153][T18856] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2844.045764][T18856] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2844.063026][T18856] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2844.073433][T18856] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2844.101528][T18856] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2844.128117][T18856] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2844.147909][T18856] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2844.168113][T18856] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2844.185642][T18856] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2844.195735][T18856] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2847.024537][T18909] bridge0: port 2(bridge_slave_1) entered disabled state [ 2847.033248][T18909] bridge0: port 1(bridge_slave_0) entered disabled state [ 2847.051303][T18912] netlink: 'syz.3.15577': attribute type 1 has an invalid length. [ 2847.063527][T18912] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15577'. [ 2848.987852][T18920] net_ratelimit: 40645 callbacks suppressed [ 2848.987873][T18920] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2849.003776][T18920] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2849.013955][T18920] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2849.023922][T18920] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2849.033891][T18920] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2849.043835][T18920] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2849.053808][T18920] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2849.063884][T18920] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2849.073896][T18920] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2849.083897][T18920] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2850.477654][T18943] FAULT_INJECTION: forcing a failure. [ 2850.477654][T18943] name failslab, interval 1, probability 0, space 0, times 0 [ 2850.498331][T18943] CPU: 1 PID: 18943 Comm: syz.4.15586 Not tainted syzkaller #0 [ 2850.505945][T18943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2850.516110][T18943] Call Trace: [ 2850.519421][T18943] [ 2850.522376][T18943] dump_stack_lvl+0x188/0x24e [ 2850.527094][T18943] ? show_regs_print_info+0x12/0x12 [ 2850.532421][T18943] ? load_image+0x400/0x400 [ 2850.536928][T18943] ? __might_sleep+0xd0/0xd0 [ 2850.541554][T18943] ? __lock_acquire+0x7d10/0x7d10 [ 2850.546589][T18943] ? mark_lock+0x94/0x320 [ 2850.550926][T18943] should_fail_ex+0x399/0x4d0 [ 2850.555601][T18943] should_failslab+0x5/0x20 [ 2850.560122][T18943] slab_pre_alloc_hook+0x59/0x310 [ 2850.565218][T18943] ? __get_vm_area_node+0x122/0x330 [ 2850.570446][T18943] __kmem_cache_alloc_node+0x4f/0x260 [ 2850.575941][T18943] ? __get_vm_area_node+0x122/0x330 [ 2850.581262][T18943] kmalloc_node_trace+0x22/0xe0 [ 2850.586132][T18943] __get_vm_area_node+0x122/0x330 [ 2850.591163][T18943] __vmalloc_node_range+0x357/0x13b0 [ 2850.596536][T18943] ? bpf_prog_alloc_no_stats+0x3a/0x3a0 [ 2850.602116][T18943] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2850.608131][T18943] ? free_vm_area+0x50/0x50 [ 2850.612651][T18943] ? rcu_is_watching+0x11/0xa0 [ 2850.617437][T18943] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2850.623600][T18943] ? bpf_prog_alloc_no_stats+0x3a/0x3a0 [ 2850.629452][T18943] __vmalloc+0x76/0x80 [ 2850.633538][T18943] ? bpf_prog_alloc_no_stats+0x3a/0x3a0 [ 2850.639200][T18943] bpf_prog_alloc_no_stats+0x3a/0x3a0 [ 2850.644689][T18943] bpf_prog_alloc+0x1c/0x1b0 [ 2850.649312][T18943] bpf_prog_load+0x7c9/0x1560 [ 2850.654001][T18943] ? map_freeze+0x390/0x390 [ 2850.658508][T18943] ? __might_fault+0xa6/0x120 [ 2850.663188][T18943] ? __might_fault+0xa6/0x120 [ 2850.667856][T18943] ? __might_fault+0xc2/0x120 [ 2850.672524][T18943] ? __might_fault+0xa6/0x120 [ 2850.677192][T18943] ? bpf_lsm_bpf+0x5/0x10 [ 2850.681518][T18943] ? security_bpf+0x7a/0xa0 [ 2850.686019][T18943] __sys_bpf+0x5b8/0x780 [ 2850.690285][T18943] ? bpf_link_show_fdinfo+0x380/0x380 [ 2850.695704][T18943] ? lock_chain_count+0x20/0x20 [ 2850.700574][T18943] __x64_sys_bpf+0x78/0x90 [ 2850.705010][T18943] do_syscall_64+0x4c/0xa0 [ 2850.709540][T18943] ? clear_bhb_loop+0x60/0xb0 [ 2850.714237][T18943] ? clear_bhb_loop+0x60/0xb0 [ 2850.718921][T18943] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2850.724845][T18943] RIP: 0033:0x7fe02159c799 [ 2850.729281][T18943] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2850.748892][T18943] RSP: 002b:00007fe0223a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2850.757330][T18943] RAX: ffffffffffffffda RBX: 00007fe021815fa0 RCX: 00007fe02159c799 [ 2850.765493][T18943] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 2850.773492][T18943] RBP: 00007fe0223a1090 R08: 0000000000000000 R09: 0000000000000000 [ 2850.781487][T18943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2850.789562][T18943] R13: 00007fe021816038 R14: 00007fe021815fa0 R15: 00007ffdb0b5ace8 [ 2850.797655][T18943] [ 2850.884948][T18943] syz.4.15586: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 2850.935738][T18943] CPU: 1 PID: 18943 Comm: syz.4.15586 Not tainted syzkaller #0 [ 2850.943356][T18943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2850.953534][T18943] Call Trace: [ 2850.956831][T18943] [ 2850.959795][T18943] dump_stack_lvl+0x188/0x24e [ 2850.964524][T18943] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2850.970790][T18943] ? show_regs_print_info+0x12/0x12 [ 2850.976006][T18943] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2850.982194][T18943] warn_alloc+0x242/0x330 [ 2850.986557][T18943] ? __get_vm_area_node+0x122/0x330 [ 2850.991803][T18943] ? zone_watermark_ok_safe+0x270/0x270 [ 2850.997515][T18943] ? rcu_is_watching+0x11/0xa0 [ 2851.002332][T18943] ? __get_vm_area_node+0x318/0x330 [ 2851.007589][T18943] __vmalloc_node_range+0x37c/0x13b0 [ 2851.012939][T18943] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2851.019050][T18943] ? free_vm_area+0x50/0x50 [ 2851.023596][T18943] ? rcu_is_watching+0x11/0xa0 [ 2851.028397][T18943] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2851.034766][T18943] ? bpf_prog_alloc_no_stats+0x3a/0x3a0 [ 2851.040438][T18943] __vmalloc+0x76/0x80 [ 2851.044534][T18943] ? bpf_prog_alloc_no_stats+0x3a/0x3a0 [ 2851.050112][T18943] bpf_prog_alloc_no_stats+0x3a/0x3a0 [ 2851.055583][T18943] bpf_prog_alloc+0x1c/0x1b0 [ 2851.060187][T18943] bpf_prog_load+0x7c9/0x1560 [ 2851.064875][T18943] ? map_freeze+0x390/0x390 [ 2851.069382][T18943] ? __might_fault+0xa6/0x120 [ 2851.074056][T18943] ? __might_fault+0xa6/0x120 [ 2851.078750][T18943] ? __might_fault+0xc2/0x120 [ 2851.083433][T18943] ? __might_fault+0xa6/0x120 [ 2851.088126][T18943] ? bpf_lsm_bpf+0x5/0x10 [ 2851.092524][T18943] ? security_bpf+0x7a/0xa0 [ 2851.097063][T18943] __sys_bpf+0x5b8/0x780 [ 2851.101350][T18943] ? bpf_link_show_fdinfo+0x380/0x380 [ 2851.106824][T18943] ? lock_chain_count+0x20/0x20 [ 2851.111685][T18943] __x64_sys_bpf+0x78/0x90 [ 2851.116099][T18943] do_syscall_64+0x4c/0xa0 [ 2851.120615][T18943] ? clear_bhb_loop+0x60/0xb0 [ 2851.125286][T18943] ? clear_bhb_loop+0x60/0xb0 [ 2851.129968][T18943] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2851.135954][T18943] RIP: 0033:0x7fe02159c799 [ 2851.140387][T18943] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2851.160038][T18943] RSP: 002b:00007fe0223a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2851.168833][T18943] RAX: ffffffffffffffda RBX: 00007fe021815fa0 RCX: 00007fe02159c799 [ 2851.176833][T18943] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 2851.184928][T18943] RBP: 00007fe0223a1090 R08: 0000000000000000 R09: 0000000000000000 [ 2851.194424][T18943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2851.202615][T18943] R13: 00007fe021816038 R14: 00007fe021815fa0 R15: 00007ffdb0b5ace8 [ 2851.210701][T18943] [ 2851.215126][T18943] Mem-Info: [ 2851.232058][T18943] active_anon:8145 inactive_anon:0 isolated_anon:0 [ 2851.232058][T18943] active_file:27792 inactive_file:41032 isolated_file:0 [ 2851.232058][T18943] unevictable:768 dirty:97 writeback:0 [ 2851.232058][T18943] slab_reclaimable:21917 slab_unreclaimable:111589 [ 2851.232058][T18943] mapped:33768 shmem:1362 pagetables:638 [ 2851.232058][T18943] sec_pagetables:0 bounce:0 [ 2851.232058][T18943] kernel_misc_reclaimable:0 [ 2851.232058][T18943] free:1296302 free_pcp:6381 free_cma:0 [ 2851.398111][T18943] Node 0 active_anon:32580kB inactive_anon:0kB active_file:111168kB inactive_file:163924kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:135072kB dirty:388kB writeback:0kB shmem:3912kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:10236kB pagetables:2552kB sec_pagetables:0kB all_unreclaimable? no [ 2851.454421][T18943] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 2851.503933][T21569] tipc: Subscription rejected, illegal request [ 2851.621050][T18943] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2851.656475][T18943] lowmem_reserve[]: 0 2527 2528 2528 2528 [ 2851.663646][T18943] Node 0 DMA32 free:1271764kB boost:0kB min:34692kB low:43364kB high:52036kB reserved_highatomic:0KB active_anon:32580kB inactive_anon:0kB active_file:111168kB inactive_file:163924kB unevictable:1536kB writepending:388kB present:3129332kB managed:2592976kB mlocked:0kB bounce:0kB free_pcp:5424kB local_pcp:816kB free_cma:0kB [ 2851.707115][T18943] lowmem_reserve[]: 0 0 1 1 1 [ 2851.714155][T18943] Node 0 Normal free:8kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:1424kB mlocked:0kB bounce:0kB free_pcp:20kB local_pcp:12kB free_cma:0kB [ 2851.751051][T18943] lowmem_reserve[]: 0 0 0 0 0 [ 2851.756055][T18943] Node 1 Normal free:3897584kB boost:0kB min:55192kB low:68988kB high:82784kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:19360kB local_pcp:10880kB free_cma:0kB [ 2851.796234][T18943] lowmem_reserve[]: 0 0 0 0 0 [ 2851.804569][T18943] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 2851.825987][T18943] Node 0 DMA32: 1465*4kB (UME) 2114*8kB (UME) 1842*16kB (UME) 2716*32kB (UME) 2377*64kB (UME) 1566*128kB (UME) 609*256kB (UME) 245*512kB (UM) 57*1024kB (UM) 11*2048kB (UM) 102*4096kB (M) = 1271764kB [ 2851.855307][T18943] Node 0 Normal: 0*4kB 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 2851.885383][T18943] Node 1 Normal: 222*4kB (UE) 45*8kB (UE) 33*16kB (UME) 38*32kB (UME) 21*64kB (UME) 10*128kB (UME) 1*256kB (M) 3*512kB (UME) 1*1024kB (E) 1*2048kB (E) 949*4096kB (M) = 3897584kB [ 2851.912545][T18943] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2851.925960][T18943] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 2851.944023][T18943] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2851.955966][T18943] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 2851.974478][T18943] 70186 total pagecache pages [ 2851.981157][T18943] 0 pages in swap cache [ 2851.985348][T18943] Free swap = 124996kB [ 2851.995509][T18943] Total swap = 124996kB [ 2852.001516][T18943] 2097051 pages RAM [ 2852.005355][T18943] 0 pages HighMem/MovableOnly [ 2852.012659][T18943] 415206 pages reserved [ 2852.016891][T18943] 0 pages cma reserved [ 2853.997787][T18975] net_ratelimit: 27718 callbacks suppressed [ 2853.997807][T18975] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2854.020988][T18975] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2854.034176][T18975] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2854.046439][T18975] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2854.059609][T18975] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2854.069777][T18975] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2854.082250][T18975] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2854.095491][T18975] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2854.107083][T18975] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2854.119433][T18975] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 2855.384230][T18990] netlink: 'syz.1.15600': attribute type 2 has an invalid length. [ 2855.426668][T18990] device 0 entered promiscuous mode [ 2855.551471][T18999] netlink: 'syz.4.15604': attribute type 1 has an invalid length. [ 2855.561581][T18999] netlink: 144 bytes leftover after parsing attributes in process `syz.4.15604'. [ 2855.626797][T19001] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2855.674642][T19001] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2856.390115][T19001] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2856.398329][T19001] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2856.978086][T19041] FAULT_INJECTION: forcing a failure. [ 2856.978086][T19041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2856.999739][T19041] CPU: 1 PID: 19041 Comm: syz.3.15616 Not tainted syzkaller #0 [ 2857.007355][T19041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2857.017440][T19041] Call Trace: [ 2857.020734][T19041] [ 2857.023675][T19041] dump_stack_lvl+0x188/0x24e [ 2857.028388][T19041] ? show_regs_print_info+0x12/0x12 [ 2857.033714][T19041] ? load_image+0x400/0x400 [ 2857.038242][T19041] ? __lock_acquire+0x7d10/0x7d10 [ 2857.043309][T19041] ? __virt_addr_valid+0x188/0x540 [ 2857.048799][T19041] should_fail_ex+0x399/0x4d0 [ 2857.053499][T19041] _copy_from_user+0x2c/0x170 [ 2857.058203][T19041] bpf_test_init+0xde/0x140 [ 2857.062737][T19041] bpf_prog_test_run_xdp+0x484/0xf10 [ 2857.068139][T19041] ? dev_put+0x80/0x80 [ 2857.072589][T19041] ? dev_put+0x80/0x80 [ 2857.076679][T19041] bpf_prog_test_run+0x31e/0x390 [ 2857.081648][T19041] __sys_bpf+0x62b/0x780 [ 2857.085919][T19041] ? bpf_link_show_fdinfo+0x380/0x380 [ 2857.091332][T19041] ? lock_chain_count+0x20/0x20 [ 2857.096217][T19041] __x64_sys_bpf+0x78/0x90 [ 2857.100661][T19041] do_syscall_64+0x4c/0xa0 [ 2857.105095][T19041] ? clear_bhb_loop+0x60/0xb0 [ 2857.109792][T19041] ? clear_bhb_loop+0x60/0xb0 [ 2857.114502][T19041] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2857.120588][T19041] RIP: 0033:0x7f0776b9c799 [ 2857.125031][T19041] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2857.144756][T19041] RSP: 002b:00007f0777a10028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2857.153512][T19041] RAX: ffffffffffffffda RBX: 00007f0776e15fa0 RCX: 00007f0776b9c799 [ 2857.161508][T19041] RDX: 0000000000000050 RSI: 0000200000000740 RDI: 000000000000000a [ 2857.169557][T19041] RBP: 00007f0777a10090 R08: 0000000000000000 R09: 0000000000000000 [ 2857.177664][T19041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2857.185930][T19041] R13: 00007f0776e16038 R14: 00007f0776e15fa0 R15: 00007ffc415d5b98 [ 2857.193941][T19041] [ 2857.738098][T22314] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 2857.746558][T22314] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 2857.756603][T22314] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 2857.774231][T22314] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 2857.781909][T22314] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 2857.793091][T22314] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 2858.292292][T17203] team0: Port device syz_tun removed [ 2858.391360][T19051] chnl_net:caif_netlink_parms(): no params data found [ 2858.496428][T19051] bridge0: port 1(bridge_slave_0) entered blocking state [ 2858.504175][T19051] bridge0: port 1(bridge_slave_0) entered disabled state [ 2858.512766][T19051] device bridge_slave_0 entered promiscuous mode [ 2858.524288][T19051] bridge0: port 2(bridge_slave_1) entered blocking state [ 2858.532031][T19051] bridge0: port 2(bridge_slave_1) entered disabled state [ 2858.540584][T19051] device bridge_slave_1 entered promiscuous mode [ 2858.558949][T19051] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2858.573223][T19051] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2858.600295][T19051] team0: Port device team_slave_0 added [ 2858.610474][T19051] team0: Port device team_slave_1 added [ 2858.631553][T19051] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2858.638659][T19051] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2858.664958][T19051] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2858.679172][T19051] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2858.686160][T19051] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2858.718115][T19051] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2858.752337][T19051] device hsr_slave_0 entered promiscuous mode [ 2858.759418][T19051] device hsr_slave_1 entered promiscuous mode [ 2858.766026][T19051] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2858.775980][T19051] Cannot create hsr debugfs directory [ 2858.883697][T19051] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 2858.893046][T19051] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 2858.904540][T19051] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 2858.913886][T19051] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 2858.933643][T19051] bridge0: port 2(bridge_slave_1) entered blocking state [ 2858.940768][T19051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2858.948166][T19051] bridge0: port 1(bridge_slave_0) entered blocking state [ 2858.955246][T19051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2858.997218][T19051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2859.016483][T19051] 8021q: adding VLAN 0 to HW filter on device team0 [ 2859.024139][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2859.035657][T31927] bridge0: port 1(bridge_slave_0) entered disabled state [ 2859.045529][T31927] bridge0: port 2(bridge_slave_1) entered disabled state [ 2859.055355][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2859.071809][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2859.081071][ T6567] bridge0: port 1(bridge_slave_0) entered blocking state [ 2859.088485][ T6567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2859.099611][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2859.108490][ T6567] bridge0: port 2(bridge_slave_1) entered blocking state [ 2859.115570][ T6567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2859.141243][ T6557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2859.150104][ T6557] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2859.164896][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2859.176610][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2859.193585][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2859.203793][T19051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2859.365800][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2859.373518][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2859.389065][T19051] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2859.613563][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2859.627549][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2859.647419][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2859.656226][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2859.667632][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2859.675886][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2859.691669][T19051] device veth0_vlan entered promiscuous mode [ 2859.705644][T19051] device veth1_vlan entered promiscuous mode [ 2859.724709][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2859.732906][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2859.742163][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2859.751108][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2859.761905][T19051] device veth0_macvtap entered promiscuous mode [ 2859.773332][T19051] device veth1_macvtap entered promiscuous mode [ 2859.787356][T19051] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2859.797979][T19051] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2859.808002][T19051] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2859.818807][T19051] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2859.829707][T19051] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2859.841182][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2859.849935][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2859.858283][T22314] Bluetooth: hci5: command 0x0409 tx timeout [ 2859.858517][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2859.876451][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2859.887635][T19051] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2859.898233][T19051] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2859.908155][T19051] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2859.918755][T19051] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2859.928814][T19051] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2859.942722][T19051] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2859.952741][T19051] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2859.963357][T19051] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2859.974459][T19051] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2859.983695][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2859.993188][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2860.006228][T19051] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2860.015284][T19051] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2860.024391][T19051] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2860.033192][T19051] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2860.091504][T31927] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2860.106292][T31927] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2860.114434][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2860.133497][T31927] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2860.144634][T31927] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2860.153073][T31927] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2860.210895][T19090] netlink: 'syz.5.15617': attribute type 1 has an invalid length. [ 2860.220115][T19090] netlink: 16410 bytes leftover after parsing attributes in process `syz.5.15617'. [ 2861.928024][T22314] Bluetooth: hci5: command 0x041b tx timeout [ 2864.008286][T22314] Bluetooth: hci5: command 0x040f tx timeout [ 2866.087924][T22314] Bluetooth: hci5: command 0x0419 tx timeout [ 2889.455775][T22314] Bluetooth: hci2: command 0x0406 tx timeout [ 2902.731528][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 2902.737895][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 2964.170682][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 2964.177046][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 2981.607958][T31368] Bluetooth: hci5: command 0x0406 tx timeout [ 3001.288069][ T28] INFO: task syz.2.15555:18833 blocked for more than 143 seconds. [ 3001.295903][ T28] Not tainted syzkaller #0 [ 3001.300974][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3001.309907][ T28] task:syz.2.15555 state:D stack:26896 pid:18833 ppid:17203 flags:0x00004002 [ 3001.319398][ T28] Call Trace: [ 3001.322694][ T28] [ 3001.325641][ T28] __schedule+0x11d1/0x40e0 [ 3001.330240][ T28] ? __mutex_lock+0x1ab/0xaf0 [ 3001.335051][ T28] ? __sched_text_start+0x8/0x8 [ 3001.342812][ T28] ? task_work_cancel+0xa1/0x220 [ 3001.349861][ T28] ? task_work_cancel_func+0x210/0x210 [ 3001.355446][ T28] ? __mutex_unlock_slowpath+0x1b0/0x6c0 [ 3001.363052][ T28] ? _free_event+0xfd/0x10a0 [ 3001.367649][ T28] schedule+0xb9/0x180 [ 3001.371918][ T28] _free_event+0x171/0x10a0 [ 3001.376459][ T28] ? perf_mmap+0x13d0/0x13d0 [ 3001.381884][ T28] ? perf_mmap+0x13d0/0x13d0 [ 3001.386500][ T28] perf_event_release_kernel+0x83e/0x8d0 [ 3001.392204][ T28] ? __might_sleep+0xd0/0xd0 [ 3001.396814][ T28] ? calc_timer_values+0x410/0x410 [ 3001.401992][ T28] ? perf_mmap+0x13d0/0x13d0 [ 3001.406571][ T28] perf_release+0x37/0x40 [ 3001.410971][ T28] __fput+0x22c/0x920 [ 3001.414966][ T28] task_work_run+0x1d0/0x260 [ 3001.419618][ T28] ? task_work_cancel+0x220/0x220 [ 3001.425176][ T28] ? do_raw_spin_unlock+0x11d/0x230 [ 3001.430696][ T28] do_exit+0x982/0x2480 [ 3001.434939][ T28] ? preempt_schedule+0xbc/0xd0 [ 3001.439835][ T28] ? put_task_struct+0x80/0x80 [ 3001.444700][ T28] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 3001.451025][ T28] ? lock_chain_count+0x20/0x20 [ 3001.455967][ T28] ? preempt_schedule_thunk+0x16/0x18 [ 3001.461449][ T28] do_group_exit+0x217/0x2d0 [ 3001.466059][ T28] __x64_sys_exit_group+0x3b/0x40 [ 3001.471156][ T28] do_syscall_64+0x4c/0xa0 [ 3001.475581][ T28] ? clear_bhb_loop+0x60/0xb0 [ 3001.480316][ T28] ? clear_bhb_loop+0x60/0xb0 [ 3001.485033][ T28] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3001.491163][ T28] RIP: 0033:0x7fc091d9c799 [ 3001.495600][ T28] RSP: 002b:00007fc092c1af38 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 3001.504105][ T28] RAX: ffffffffffffffda RBX: 00007fc091e093e8 RCX: 00007fc091d9c799 [ 3001.512469][ T28] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 3001.520506][ T28] RBP: 000000000000000e R08: 0000000000000000 R09: 00007fc092016038 [ 3001.528570][ T28] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3001.536613][ T28] R13: 00007fc092016038 R14: 00007fc092015fa0 R15: 00007fff41a61ff8 [ 3001.544649][ T28] [ 3001.547685][ T28] [ 3001.547685][ T28] Showing all locks held in the system: [ 3001.555568][ T28] 1 lock held by rcu_tasks_kthre/12: [ 3001.560922][ T28] #0: ffffffff8cb2dfb0 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x33/0xf00 [ 3001.571522][ T28] 1 lock held by rcu_tasks_trace/13: [ 3001.576824][ T28] #0: ffffffff8cb2e7d0 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x33/0xf00 [ 3001.588192][ T28] 1 lock held by khungtaskd/28: [ 3001.593044][ T28] #0: ffffffff8cb2d620 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x51/0x290 [ 3001.603558][ T28] 2 locks held by getty/4027: [ 3001.608477][ T28] #0: ffff8880304c1098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 3001.618379][ T28] #1: ffffc9000327b2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x429/0x1390 [ 3001.628600][ T28] 3 locks held by kworker/u4:3/31927: [ 3001.633971][ T28] #0: ffff8880b8f3ab18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 3001.644029][ T28] #1: ffffffff8cb2d620 (rcu_read_lock){....}-{1:2}, at: ___perf_sw_event+0x180/0x6e0 [ 3001.653680][ T28] #2: ffff8880b8f28458 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x123/0x270 [ 3001.663098][ T28] [ 3001.665432][ T28] ============================================= [ 3001.665432][ T28] [ 3001.673917][ T28] NMI backtrace for cpu 0 [ 3001.678255][ T28] CPU: 0 PID: 28 Comm: khungtaskd Not tainted syzkaller #0 [ 3001.685726][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3001.695781][ T28] Call Trace: [ 3001.699051][ T28] [ 3001.701987][ T28] dump_stack_lvl+0x188/0x24e [ 3001.706745][ T28] ? show_regs_print_info+0x12/0x12 [ 3001.711985][ T28] ? load_image+0x400/0x400 [ 3001.716488][ T28] ? vprintk_emit+0x59f/0x6a0 [ 3001.721170][ T28] ? printk_sprint+0x460/0x460 [ 3001.725939][ T28] nmi_cpu_backtrace+0x3e6/0x460 [ 3001.730904][ T28] ? nmi_trigger_cpumask_backtrace+0x450/0x450 [ 3001.737259][ T28] ? _printk+0xda/0x130 [ 3001.741425][ T28] ? load_image+0x400/0x400 [ 3001.746016][ T28] ? load_image+0x400/0x400 [ 3001.750544][ T28] ? nmi_trigger_cpumask_backtrace+0xf3/0x450 [ 3001.756636][ T28] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 3001.762882][ T28] nmi_trigger_cpumask_backtrace+0x1d4/0x450 [ 3001.768885][ T28] watchdog+0xeee/0xf30 [ 3001.773130][ T28] ? watchdog+0x1ed/0xf30 [ 3001.777477][ T28] kthread+0x29d/0x330 [ 3001.781714][ T28] ? hungtask_pm_notify+0x40/0x40 [ 3001.786944][ T28] ? kthread_blkcg+0xd0/0xd0 [ 3001.791656][ T28] ret_from_fork+0x1f/0x30 [ 3001.796113][ T28] [ 3001.799452][ T28] Sending NMI from CPU 0 to CPUs 1: [ 3001.804684][ C1] NMI backtrace for cpu 1 [ 3001.804696][ C1] CPU: 1 PID: 943 Comm: kworker/1:6 Not tainted syzkaller #0 [ 3001.804711][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3001.804720][ C1] Workqueue: events_power_efficient wg_ratelimiter_gc_entries [ 3001.804747][ C1] RIP: 0010:lock_is_held_type+0x68/0x190 [ 3001.804765][ C1] Code: 48 8b 1d 1b 67 d5 75 83 bb dc 0a 00 00 00 0f 85 df 00 00 00 41 89 f7 49 89 fe 48 c7 04 24 00 00 00 00 9c 8f 04 24 4c 8b 2c 24 48 c7 c7 00 1f 8c 8a e8 eb 12 00 00 65 ff 05 64 71 d5 75 83 bb [ 3001.804777][ C1] RSP: 0018:ffffc90004f97a78 EFLAGS: 00000246 [ 3001.804790][ C1] RAX: 0000000000000000 RBX: ffff8880321a1dc0 RCX: ffff8880321a1dc0 [ 3001.804801][ C1] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: ffffffff8cb2d680 [ 3001.804811][ C1] RBP: 00000000ffffffff R08: ffffffff8d52d7e3 R09: 1ffffffff1aa5afc [ 3001.804822][ C1] R10: dffffc0000000000 R11: fffffbfff1aa5afd R12: ffff88805a415b00 [ 3001.804834][ C1] R13: 0000000000000246 R14: ffffffff8cb2d680 R15: 00000000ffffffff [ 3001.804844][ C1] FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 3001.804857][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3001.804868][ C1] CR2: 000055c7877f7168 CR3: 000000000c88e000 CR4: 00000000003506e0 [ 3001.804887][ C1] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000008d24 [ 3001.804897][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 3001.804906][ C1] Call Trace: [ 3001.804912][ C1] [ 3001.804921][ C1] __might_resched+0x9b/0x630 [ 3001.804938][ C1] ? wg_ratelimiter_gc_entries+0x380/0x450 [ 3001.804957][ C1] ? __might_sleep+0xd0/0xd0 [ 3001.804970][ C1] ? __lock_acquire+0x7d10/0x7d10 [ 3001.804989][ C1] ? __rwlock_init+0x140/0x140 [ 3001.805001][ C1] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 3001.805021][ C1] ? do_raw_spin_unlock+0x11d/0x230 [ 3001.805036][ C1] wg_ratelimiter_gc_entries+0x3a2/0x450 [ 3001.805058][ C1] ? process_one_work+0x7b0/0x1160 [ 3001.805073][ C1] process_one_work+0x8a2/0x1160 [ 3001.805095][ C1] ? worker_detach_from_pool+0x240/0x240 [ 3001.805113][ C1] ? _raw_spin_lock_irq+0xb7/0xf0 [ 3001.805128][ C1] ? _raw_spin_lock_irqsave+0x100/0x100 [ 3001.805142][ C1] ? kthread_data+0x4b/0xc0 [ 3001.805162][ C1] worker_thread+0xaa2/0x1270 [ 3001.805185][ C1] ? __kthread_parkme+0x162/0x1c0 [ 3001.805205][ C1] kthread+0x29d/0x330 [ 3001.805217][ C1] ? worker_clr_flags+0x1a0/0x1a0 [ 3001.805232][ C1] ? kthread_blkcg+0xd0/0xd0 [ 3001.805246][ C1] ret_from_fork+0x1f/0x30 [ 3001.805270][ C1] [ 3001.815003][ T28] Kernel panic - not syncing: hung_task: blocked tasks [ 3001.815024][ T28] CPU: 0 PID: 28 Comm: khungtaskd Not tainted syzkaller #0 [ 3001.815044][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3001.815054][ T28] Call Trace: [ 3001.815061][ T28] [ 3001.815069][ T28] dump_stack_lvl+0x188/0x24e [ 3001.815098][ T28] ? memcpy+0x3c/0x60 [ 3001.815116][ T28] ? show_regs_print_info+0x12/0x12 [ 3001.815138][ T28] ? load_image+0x400/0x400 [ 3001.815174][ T28] panic+0x2e5/0x730 [ 3001.815191][ T28] ? schedule_preempt_disabled+0x20/0x20 [ 3001.815215][ T28] ? bpf_jit_dump+0xd0/0xd0 [ 3001.815232][ T28] ? __irq_work_queue_local+0x12c/0x190 [ 3001.815260][ T28] ? nmi_trigger_cpumask_backtrace+0x35b/0x450 [ 3001.815286][ T28] ? nmi_trigger_cpumask_backtrace+0x360/0x450 [ 3001.815312][ T28] watchdog+0xf2d/0xf30 [ 3001.815336][ T28] ? watchdog+0x1ed/0xf30 [ 3001.815360][ T28] kthread+0x29d/0x330 [ 3001.815376][ T28] ? hungtask_pm_notify+0x40/0x40 [ 3001.815396][ T28] ? kthread_blkcg+0xd0/0xd0 [ 3001.815413][ T28] ret_from_fork+0x1f/0x30 [ 3001.815445][ T28] [ 3001.819787][ T28] Kernel Offset: disabled [ 3002.171503][ T28] Rebooting in 86400 seconds..