last executing test programs: 29.078227484s ago: executing program 2 (id=3705): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x5, 0x0, 0x400, 0x4156, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xc}, 0x105e39, 0x0, 0xfffffffe, 0x6, 0x5, 0x2, 0x101, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0x400c78, 0x0, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000083ed007c0a23407f76ecb9a83a0c2345e145a3f826f37c7a24983fdd370100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x3a) r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0x3, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x0, 0xfc, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x8, 0xfefffffffffffffe, 0x2, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) (async) socket$kcm(0xa, 0x2, 0x0) (async) r1 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000003780)={0x0, 0xfffffeff, &(0x7f0000000000)=[{&(0x7f0000000040)="0212000902000000e4a17c45c85686605e85da4a", 0x10}], 0x1}, 0x0) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r2) (async) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) (async) ioctl$SIOCSIFHWADDR(r2, 0x8b26, &(0x7f0000000140)={'wlan1\x00', @random="000000000100"}) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x2, 0xa, 0x0, 0x5d2e, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) socketpair(0x9, 0x1, 0x84, &(0x7f0000000080)={0x0, 0x0}) close(r4) 28.587919422s ago: executing program 2 (id=3710): openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000002b00)={&(0x7f0000000180)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002940)=[@ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0x30, 0x0, 0x7}, @generic={0x94, 0x2}]}}}], 0x18}, 0x80) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d80006a5d90d9d0cb498b693da566100001800810804000000db44b904", 0x1d}], 0x1, 0x0, 0x0, 0x6000}, 0x6000800) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0xb, 0x2, 0x2}}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="07000000040000000001000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x33, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x26e1, 0x0) close(r1) r2 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x1, 0x0, 0x4, {0xa, 0x4e23, 0x9, @loopback, 0x5}}}, 0x80, 0x0, 0xfffffffffffffeb3}, 0x2000f765) ioctl$SIOCSIFHWADDR(r1, 0x8b32, &(0x7f0000000000)={'virt_wifi0\x00', @random="4ede00"}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0x1, 0xfffffffd}, 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x0, 0xd, 0x0, 0x15) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') 27.647912947s ago: executing program 2 (id=3714): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='freezer.state\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x100, 0x8}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=ANY=[@ANYBLOB="210000000000000008000000ff7f000002000500", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="0100"/24, @ANYRES32=r0, @ANYBLOB="e8da6a38f120d8ad35e2b6745036393335e7d356c3b116d47582e8a610d3864c405d86fe9c90cc316106a205e3fbaf4bbe68c8498a636b7991558ccc3533c8c04324748fc778d6e4070b3c0b80cc8b286caebc3e552fe58a2c75fd0e2a1b69fc2ac7802a14a57889dd323c1f718fd0f16ee9e10218a98ee546d27ddf9dac70f7da30dda6c4c893a26d7bc0067780a75df25c8fef4e0a0c98c705956c296b355f83b6b241085c8312b9c4f11be413"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, 0x0, 0x0}, 0x20) socket$kcm(0x29, 0x7, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="0d00000002000000040000000400000000000000", @ANYRES32=r3, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000013219ae47d57c2102a371b30729495b055bef510f4c25ad2fa1ff3f5140874f4c2c662a58924b5e6ee470ed2"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f00000004c0)=r0}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x0, &(0x7f00000000c0), &(0x7f0000000140)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x9, 0x14e, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000540)=[r1, r2, r3, r4], &(0x7f0000000580)=[{0x4, 0x3, 0x0, 0x3}, {0x4, 0x5, 0x2, 0xc}, {0x0, 0x4, 0x1, 0x9}, {0x5, 0x3, 0x8, 0xa}, {0x0, 0x1, 0xf, 0x8}], 0x10, 0xe8}, 0x94) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0xef, 0x1, 0x9, 0x6, 0x0, 0x5800000000000003, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x5, 0x100}, 0x1, 0x81, 0x6, 0x2, 0x101, 0xffffffff, 0xa, 0x0, 0x7, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r6 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x21, &(0x7f0000000100), 0x120) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r4, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000780)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa, &(0x7f0000000840)=[{}, {}], 0x10, 0x10, &(0x7f0000000880), &(0x7f0000000940), 0x8, 0x7f, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000b00)={r0}, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYRESDEC=r9], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000800)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r13, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000cc0)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x99, &(0x7f00000007c0)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f0000000840), 0x8, 0xe8, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000700000000000000080000008520e0ff020000001800000005000000000000000000000003a1ff070b0000000f3901df1328858ecd744c34", @ANYRES32=r1, @ANYBLOB="000000000000000018530000040000000000000000000000850000009a0000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x5, 0xc7, &(0x7f0000000600)=""/199, 0x41100, 0x0, '\x00', r14, 0x0, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x6, 0x5, 0x80000000, 0x7fff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000a80)=[r10, 0x1, r12], &(0x7f0000000ac0)=[{0x3, 0x1, 0x2, 0xf9c48070f00a3606}, {0x4, 0x3, 0x5, 0x4}, {0x5, 0x3, 0xa, 0x5}, {0x5, 0x2, 0xb, 0x1}], 0x10, 0x5}, 0x94) r15 = socket$kcm(0x10, 0x400000002, 0x0) setsockopt$sock_attach_bpf(r15, 0x1, 0x10, &(0x7f0000001280), 0x4) write$cgroup_subtree(r15, &(0x7f0000000080)=ANY=[@ANYBLOB="13100000", @ANYRES32], 0xfe33) recvmsg(r15, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/203, 0xcb}, 0x12140) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x9, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000008005e4c42c2481c39d3400e4ff00"/32], &(0x7f0000000700)='GPL\x00', 0xd3, 0x3e, &(0x7f0000000740)=""/62, 0x41100, 0x1, '\x00', r7, @fallback=0xd, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b80)={0x0, 0xc, 0x3, 0x8}, 0x10, 0xffffffffffffffff, r5, 0x7, &(0x7f0000000bc0)=[r6, r10, r4], &(0x7f0000000c00)=[{0x5, 0x5, 0xb, 0x1}, {0x1, 0x2, 0x6, 0x9}, {0x4, 0x5, 0x1, 0x1}, {0x5, 0x1, 0xf, 0x4}, {0x4, 0x3, 0xa, 0x2}, {0x2, 0x4, 0x40}, {0x4, 0x4, 0xe, 0xc}], 0x10, 0x9}, 0x94) sendmsg$kcm(r6, &(0x7f0000000000)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x37}, 0x0, 0x1}, 0x80, 0x0}, 0x240440d1) r16 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r16, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e00000011008188040f80ec59acbc0413a181003100000001010000000000000e000a000f000000028002002d1fb664ad3f48b9e0b0", 0x36}], 0x1}, 0x0) 27.207247303s ago: executing program 2 (id=3719): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38f0"], 0x0, 0x42, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x4001000, 0x0, 0x408, &(0x7f0000000140), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"], 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000), 0xffc0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r5, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x7, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4c, &(0x7f0000000440)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x49, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@volatile={0x6, 0x0, 0x0, 0x9, 0x2}, @restrict={0xa, 0x0, 0x0, 0xb, 0x4}]}, {0x0, [0x2e, 0x61, 0x61, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000006c0)=""/242, 0x39, 0xf2, 0x0, 0x80000000, 0x10000, @value=r2}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x8, 0x0, r2, 0x5, '\x00', r6, 0xffffffffffffffff, 0x2, 0x0, 0x4}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xf, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}], &(0x7f0000000100)='GPL\x00', 0xc6bc, 0x68, &(0x7f0000000140)=""/104, 0x41000, 0xd, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000800)={0x9, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000840)=[{0x2, 0x4, 0x0, 0x7}, {0x4, 0x4, 0x1, 0xa}, {0x0, 0x4, 0x4, 0xc}, {0x1, 0x5, 0x7, 0x1}, {0x4, 0x4, 0xe, 0x8}, {0x5, 0x1, 0x10, 0x8}], 0x10, 0x2}, 0x94) 26.297498566s ago: executing program 2 (id=3724): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="12000000040000040800000006"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0900000002000000080000004000000042", @ANYBLOB, @ANYBLOB], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r0}, 0x38) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, 0x0, &(0x7f00000000c0)='syzkaller\x00'}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f91324fc60040011000a7403004700000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x25, 0x3, 0x0, 0x0, 0x0, 0x83, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={0x0, 0x3}, 0x30c0, 0x4, 0x4, 0x8, 0x0, 0x80000000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x4001000, 0x0, 0x0, 0x0, 0x0, 0x0) 17.801660342s ago: executing program 2 (id=3758): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0x4, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="c00e000014006b03000000d86e6c1d0010ffff0af32c6e021fffffff000000000f00000017d3a705251e6182949a369f3d3b48dfd8cd3f9367c1fa51f60a64c9f4d4938037e786a6d0bdd7000000000000eaffffffb3d59256a5a2fd", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 5.823595331s ago: executing program 3 (id=3823): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) r1 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1700000071009154090893b2520ba54a07"], 0xfe33) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000042f5418e0000001d0000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_config_ext={0x200000000000004, 0x2}, 0x0, 0x0, 0xcce, 0x0, 0x5}) r3 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1, 0x0, 0x27}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="934300004300338b4ab502000000000002", @ANYRES32, @ANYRES8=r3], 0xfe33) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x2, 0xff, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04c601"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xc, 0x10, &(0x7f0000000a80)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r6, 0xfffff000, 0xe, 0x0, &(0x7f0000000300)="61df712bc884fed5722780b605a7", 0x0, 0x2f00, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1b80}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x8001, 0x0, &(0x7f0000000680), 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x5, 0x4, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r5, r2], &(0x7f00000008c0), 0x10, 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2c, 0x3, 0x0) socket$kcm(0x10, 0x2, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1, 0x8, &(0x7f0000000540)=ANY=[], &(0x7f00000006c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x603, 0x4000000}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r10, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 4.833443608s ago: executing program 3 (id=3825): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033a00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) mkdirat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x1ff) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 3.671361816s ago: executing program 3 (id=3829): syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffff8d}, 0x48) sendmsg$inet(r0, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac141411e00000010000000028000000000000000000000007000000940400074414"], 0x48}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000f8ffffff0095000000200000000008001800000000000000000000381055f18595311ac68b72b0a37ff360c360b244c4cd00424d544dcef90368b12a9dc35ec722a7c69341aaeb288bf14cad2973b2aa814278ddd3d4f528d8db9bf1f769583bcb2585f51297f9c5a8a918353fe1246a854adf00f84d289d21f9a5e10a778a05ea412a030000000000000030e21fd0f0965bda6c92290f1dc0ba2cb3317413643c17ff8f40d8057f560d995955027e19b3c4afa91dc7bf54e230bac77260e34e2dd800"/211], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x45, '\x00', 0x0, @fallback=0x31}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) socketpair(0x23, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000560013f16ff28e036afc004a07"], 0xfe33) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="5c00000012006b000040017ea608601602f3650400010008000000000002009ee517c356a7b0251e616859ad3a78a76e807c857e21bea297bff435cf01c937e786a6d0bdc7fcf50e4509c5cc68b7ed", 0x4f}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0x36) 3.154292217s ago: executing program 4 (id=3831): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030029000b12d25a80648c2594f90124fc60100c022100000400053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 2.963678757s ago: executing program 4 (id=3832): r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000a000000020000000000000102000000080000010800000001000084090000000400000001000000010000200061615f5f0000305f"], &(0x7f00000000c0)=""/138, 0x4a, 0x8a, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000540)}, 0x10) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002e000d640a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880), 0x4) 2.624140197s ago: executing program 1 (id=3834): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0xa, 0x922000000003, 0x11) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000005c0)="350400004100f787d25a35400c0002000200002037153e370e04018006041000450000002a560000e7ff00400000", 0x2e}, {&(0x7f0000000e80)="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", 0x407}], 0x2}, 0x10049014) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0xe, 0x0, &(0x7f0000000e40)="3242703ecfd6570416cc88c91c0e", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r2, 0xcd, 0x10}, 0xc) r3 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x7, 0x7, 0x81, 0x0, 0x0, 0xacf1, 0x60200, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0xffffffffffffffff, 0xa3d5}, 0x2020, 0x327, 0x576f, 0xa, 0x24e, 0x1, 0xe, 0x0, 0xf8, 0x0, 0x6913}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0xc) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="04000000000000000000000026bc8c20b2562e270f547b9563ebad0000000000d7385961000000"]) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$ENABLE_STATS(0x20, &(0x7f0000000340), 0x4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=0x1, 0x4) 2.510531354s ago: executing program 4 (id=3836): r0 = socket$kcm(0xa, 0x3, 0x73) r1 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(0xffffffffffffffff, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="020b0700fc", 0x5}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x10001, 0x0, 0x7, 0x9}, {0x40000002, 0x0, 0x80000001}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x6e, &(0x7f0000000000)=r4, 0x2c) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f9ff000085000000020000001800000000000000000000000000000095000000000000008a138db907014317bdc86399003ef279bcf4438908fb119c3434377c5416c3cb37b84568575efdf19a281703ec0ebd66879d0d95516f52a13ea385c52fad4aff77dd304e6a8961cc72e8fb09"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096}, 0x3f) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000200), 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x8f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000000212000000", &(0x7f0000000300)=""/8, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xfb, @remote}, 0x80, 0x0, 0x0, &(0x7f0000003f40)=ANY=[], 0xf}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r9, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000500", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002600)="89000000120081ae08060cdc030000007f1be3f74001000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00014006040400050400009bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 2.380384401s ago: executing program 1 (id=3838): openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000002b00)={&(0x7f0000000180)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002940)=[@ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0x30, 0x0, 0x7}, @generic={0x94, 0x2}]}}}], 0x18}, 0x80) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d80006a5d90d9d0cb498b693da566100001800810804000000db44b904", 0x1d}], 0x1, 0x0, 0x0, 0x6000}, 0x6000800) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0xb, 0x2, 0x2}}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="07000000040000000001000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x33, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x26e1, 0x0) close(r1) r2 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x1, 0x0, 0x4, {0xa, 0x4e23, 0x9, @loopback, 0x5}}}, 0x80, 0x0, 0xfffffffffffffeb3}, 0x2000f765) ioctl$SIOCSIFHWADDR(r1, 0x8b32, &(0x7f0000000000)={'virt_wifi0\x00', @random="4ede00"}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0x1, 0xfffffffd}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES32, @ANYRESDEC], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') 2.264864078s ago: executing program 0 (id=3839): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05000000040000000c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r1, 0xffffffffffffffff, 0x60}, 0xc) 2.166377564s ago: executing program 0 (id=3840): r0 = socket$kcm(0x11, 0x3, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r1) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async, rerun: 64) socket$kcm(0x10, 0x2, 0x4) (async, rerun: 64) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}) (async, rerun: 64) r3 = socket$kcm(0x2c, 0x3, 0x0) (rerun: 64) recvmsg$kcm(r3, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x100) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x5, 0x1, 0x4, 0x12, 0x0, 0x5, 0x200, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000500), 0x8}, 0x210, 0xffffffffffffffff, 0xff, 0x5, 0x3, 0xfc000000, 0x5, 0x0, 0x4, 0x0, 0xff}, 0x0, 0xa, r4, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r4, &(0x7f0000000340)="0981e13a67d96f9fe012f3370695a25095fff6c820a04b5a60fbe58c7c3d080c913b5ec21b4f33958cb7a46398270f17d8c70a9504cfffa3a13c5b50da570271773520808e9ffce9822d32a377e255e29ae3", &(0x7f0000001900)=""/4096, 0x4}, 0x20) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'tunl0\x00', 0x10}) (async) sendmsg$kcm(r0, &(0x7f0000000fc0)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x31}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000040)="b8b2cc1e00c1dba49d23bb66cb3a66bb02", 0x11}], 0x1}, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6, 0x8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r5}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x5, 0x5, &(0x7f00000000c0)=@framed={{0x5d, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@map_fd={0x18, 0x9, 0x1, 0x0, r6}]}, &(0x7f0000000000)='GPL\x00'}, 0x80) (async, rerun: 64) r7 = socket$kcm(0x2, 0x1000000000000002, 0x0) (rerun: 64) sendmsg$inet(r7, &(0x7f0000000b40)={&(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000000c0)=[{0x0, 0x4f}], 0x1, &(0x7f0000000180)=[@ip_pktinfo={{0x2f, 0x0, 0x7, {0x0, @dev, @loopback}}}], 0x30}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x9, 0x1, 0xb8}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 2.154862774s ago: executing program 1 (id=3841): perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, 0x0, 0x15b76fa0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x3, 0x0, 0x3}, 0x10}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0xbaa}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), 0x0, 0xa7c, r1}, 0x38) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000008c0), 0x43) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)=""/43, 0x2b}], 0x1}, 0x82) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60284c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x84800) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext, 0x101000, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x3d, 0x0, 0x1, 0x20}, {0x4d}, {0x6, 0x0, 0xfe}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0x2, 0x0) close(r6) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0xffffffffffffffff, 0x1, 0x2000}}, 0x10, 0x0}, 0x4040000) socket$kcm(0xa, 0x6, 0x0) 1.984212425s ago: executing program 0 (id=3842): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030029000b12d25a80648c2594f90124fc60100c022100000400053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 1.983687615s ago: executing program 4 (id=3843): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003b000b05d25a806c8c6394f90324fc601000050008000900053582c137153e37000c0180fc0b1d00f80b", 0x33fe0}], 0x1, 0x0, 0x0, 0x12}, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0xe, 0x1, 0x4, 0x80, 0x0, 0x44, 0x40104, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x1ff, 0xffffffffffffff2e}, 0x13122, 0x3, 0x6, 0x9, 0x6, 0x2, 0x9781, 0x0, 0x8001, 0x0, 0x23a}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x80, 0x0}, 0x8000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000480)="b9ffb2ed6844268cb89e14f0886411e0ff15661aaa50e7369dfbac141416e000004062079f4b", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$sock(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 1.862717662s ago: executing program 1 (id=3844): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x894a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x3000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x200000000000014f, 0x41, &(0x7f0000001680)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x19, 0x10, 0x8, 0x0, 0x0}}, 0x10) 1.837849273s ago: executing program 0 (id=3845): openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x880, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000004000000020000000000000802000000000000000100000d01000000020000000100000000005f"], 0x0, 0x3c}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc00, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='pids.events\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x921b0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xb, 0x0, 0x81, 0x0, 0x8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000100)=r4, 0x4) sendmsg$sock(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="baf909eb4380105430ae7fae24e25921d8d0c94d96470126054b98454b1aba64adb9536b37b6dc83015c787601023a05819996d428409fd83c762c111fda09bc1378e3a9d410617cc3d1b692428d3d65f9dd86c2e487f43231d723c747a64cb800f78f19f9667d4b9eace0367283f9bea5893c31dc771f1219d1ca0c630642fe71efa4ee0f91ba1d37f2ca60528243843e121f5092bf5a3a3f5418e542", 0x9d}, {&(0x7f0000001440)="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", 0x4e4}], 0x2, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x4008000) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000011c0)="e83a", 0x2}], 0x1, 0x0, 0x0, 0x10000000}, 0x12cd) sendmsg$kcm(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000300)="0b571145b1e0f1f75cf047903414f42cfd01", 0x12}], 0x1}, 0x8840) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000001c0)="39000000120081ae0000dc676f97daf01e2357f9ffffffffffffff0521018701546fabca1b4e8a06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3, 0x4}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb010018000000000043ab45346e4378dd0000180205001800000009000000000000000100000448b700740c447b75ed7d643224e3c561f5b956207dad7f3ca79402df50a30041"], &(0x7f0000000580)=""/263, 0x39, 0x107, 0x1}, 0x28) r6 = socket$kcm(0x10, 0x2, 0x10) r7 = socket$kcm(0x1e, 0x1, 0x0) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(r7, &(0x7f00000014c0)={&(0x7f0000001540)=@tipc=@id={0x1e, 0x3, 0x0, {0x0, 0x2}}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x18, 0x4, &(0x7f00000005c0)=ANY=[@ANYRES16=r5], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)=[0x0], 0x0, 0x0, 0x78, &(0x7f0000000340), 0x0, 0x0, 0x0, &(0x7f0000000440), 0x8, 0x35, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r1, 0x58, &(0x7f0000000600)}, 0x10) sendmsg$inet(r1, 0x0, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1b, 0x5, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000002c0)=r9, 0x4) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000003c0)="d800000018007b18e00212ba0d8105040a0a1100fe0f040b067c55a1bc0009001e0006990300000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b01602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd601edef3d93452a92307f00000e97031e9f05e9f16e9cb5", 0xd2}, {&(0x7f00000004c0)="f80ec2e2badd", 0x6}], 0x2, 0x0, 0x0, 0x2663}, 0x0) sendmsg$kcm(r6, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030036000b05d25a806c8c6f94f90424fc60100005000a000200053582c137153e37000c0980fc0b10000300", 0x2e}], 0x1}, 0x0) 1.446532746s ago: executing program 3 (id=3846): r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000a000000020000000000000102000000080000010800000001000084090000000400000001000000010000200061615f5f0000305f"], &(0x7f00000000c0)=""/138, 0x4a, 0x8a, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002e000d640a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880), 0x4) 1.392242019s ago: executing program 1 (id=3847): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x894a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x3000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x200000000000014f, 0x41, &(0x7f0000001680)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x19, 0x10, 0x8, 0x0, 0x0}}, 0x10) (fail_nth: 2) 1.391578529s ago: executing program 4 (id=3848): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x3}, 0x50) r3 = socket$kcm(0x23, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0xa, &(0x7f0000000180), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x541b, &(0x7f0000000640)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x3, 0x21, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xe}, @ldst={0x0, 0x0, 0x1, 0x8, 0x4, 0xfffffffffffffffe, 0x10}, @generic={0x82, 0x8, 0x3, 0x7f, 0x8}, @call={0x85, 0x0, 0x0, 0xc1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000680)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000000)="5becbc0e0d7cca6073a4f11d1b00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.kill\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x2}, 0x0, 0xffffffffffffffff, r6, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={@cgroup=r6, r0, 0xaef8a1f703c588b1, 0x20, r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1500000000"], 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x50) r8 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020023000b03d25a806f8c6394f90524fc60040f030047", 0x19}], 0x1}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a0033d4"], 0xfe33) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8a00fe00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000240), 0x12) 1.20529633s ago: executing program 3 (id=3849): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='freezer.state\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x100, 0x8}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=ANY=[@ANYBLOB="210000000000000008000000ff7f000002000500", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="0100"/24, @ANYRES32=r0, @ANYBLOB="e8da6a38f120d8ad35e2b6745036393335e7d356c3b116d47582e8a610d3864c405d86fe9c90cc316106a205e3fbaf4bbe68c8498a636b7991558ccc3533c8c04324748fc778d6e4070b3c0b80cc8b286caebc3e552fe58a2c75fd0e2a1b69fc2ac7802a14a57889dd323c1f718fd0f16ee9e10218a98ee546d27ddf9dac70f7da30dda6c4c893a26d7bc0067780a75df25c8fef4e0a0c98c705956c296b355f83b6b241085c8312b9c4f11be413"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, 0x0, 0x0}, 0x20) socket$kcm(0x29, 0x7, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="0d00000002000000040000000400000000000000", @ANYRES32=r3, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000013219ae47d57c2102a371b30729495b055bef510f4c25ad2fa1ff3f5140874f4c2c662a58924b5e6ee470ed2"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f00000004c0)=r0}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x0, &(0x7f00000000c0), &(0x7f0000000140)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x9, 0x14e, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000540)=[r1, r2, r3, r4], &(0x7f0000000580)=[{0x4, 0x3, 0x0, 0x3}, {0x4, 0x5, 0x2, 0xc}, {0x0, 0x4, 0x1, 0x9}, {0x5, 0x3, 0x8, 0xa}, {0x0, 0x1, 0xf, 0x8}], 0x10, 0xe8}, 0x94) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0xef, 0x1, 0x9, 0x6, 0x0, 0x5800000000000003, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x5, 0x100}, 0x1, 0x81, 0x6, 0x2, 0x101, 0xffffffff, 0xa, 0x0, 0x7, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r6 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x21, &(0x7f0000000100), 0x120) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r4, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000780)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa, &(0x7f0000000840)=[{}, {}], 0x10, 0x10, &(0x7f0000000880), &(0x7f0000000940), 0x8, 0x7f, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000b00)={r0}, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYRESDEC=r9], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000800)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r13, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000cc0)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x99, &(0x7f00000007c0)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f0000000840), 0x8, 0xe8, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000700000000000000080000008520e0ff020000001800000005000000000000000000000003a1ff070b0000000f3901df1328858ecd744c34", @ANYRES32=r1, @ANYBLOB="000000000000000018530000040000000000000000000000850000009a0000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x5, 0xc7, &(0x7f0000000600)=""/199, 0x41100, 0x0, '\x00', r14, 0x0, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x6, 0x5, 0x80000000, 0x7fff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000a80)=[r10, 0x1, r12], &(0x7f0000000ac0)=[{0x3, 0x1, 0x2, 0xf9c48070f00a3606}, {0x4, 0x3, 0x5, 0x4}, {0x5, 0x3, 0xa, 0x5}, {0x5, 0x2, 0xb, 0x1}], 0x10, 0x5}, 0x94) r15 = socket$kcm(0x10, 0x400000002, 0x0) setsockopt$sock_attach_bpf(r15, 0x1, 0x10, &(0x7f0000001280), 0x4) write$cgroup_subtree(r15, &(0x7f0000000080)=ANY=[@ANYBLOB="13100000", @ANYRES32], 0xfe33) recvmsg(r15, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/203, 0xcb}, 0x12140) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x9, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000008005e4c42c2481c39d3400e4ff00"/32], &(0x7f0000000700)='GPL\x00', 0xd3, 0x3e, &(0x7f0000000740)=""/62, 0x41100, 0x1, '\x00', r7, @fallback=0xd, r8, 0x8, &(0x7f0000000b40)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000b80)={0x0, 0xc, 0x3, 0x8}, 0x10, 0xffffffffffffffff, r5, 0x7, &(0x7f0000000bc0)=[r6, r10], &(0x7f0000000c00)=[{0x5, 0x5, 0xb, 0x1}, {0x1, 0x2, 0x6, 0x9}, {0x4, 0x5, 0x1, 0x1}, {0x5, 0x1, 0xf, 0x4}, {0x4, 0x3, 0xa, 0x2}, {0x2, 0x4, 0x40}, {0x4, 0x4, 0xe, 0xc}], 0x10, 0x9}, 0x94) sendmsg$kcm(r6, &(0x7f0000000000)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x37}, 0x0, 0x1}, 0x80, 0x0}, 0x240440d1) r16 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r16, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e00000011008188040f80ec59acbc0413a181003100000001010000000000000e000a000f000000028002002d1fb664ad3f48b9e0b0", 0x36}], 0x1}, 0x0) 1.161172952s ago: executing program 0 (id=3850): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0xe, &(0x7f0000001900)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r1 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca4e, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000100)="b9ff030f6044238cb89e14f088a81bff88caffff4000638477fbac14142ce934a0a662079f4b4d2f87e56dca6aab085013f288a81a3986dd0b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$sock(r4, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000001c0)="33f462", 0x3}], 0x1}, 0x44801) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)='\x00\x00', 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) r5 = socket$kcm(0x10, 0x3, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r2, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000b80)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x9c, &(0x7f0000000c40)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0xdb, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000e80), 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000903000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r8, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000f40)={0x0, 0x1, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001040)={0x6, 0x1, &(0x7f0000000a40)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000a80)='syzkaller\x00', 0x1, 0x8a, &(0x7f0000000ac0)=""/138, 0x41100, 0x25, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000ec0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000f00)={0x5, 0x5, 0x3, 0x57cf}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000f80)=[r8, r9], &(0x7f0000000fc0)=[{0x3, 0x3, 0x0, 0xb}, {0x2, 0x4, 0xa, 0xc}, {0x2, 0x3, 0xf, 0x9}, {0x4, 0x1, 0x1, 0x5}, {0x5, 0x5, 0x7, 0x4}], 0x10, 0x7}, 0x94) sendmsg$kcm(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000035000b0fd25a806c8c6f94f90224fc60", 0x14}], 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, &(0x7f0000000000), 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={&(0x7f0000000580)="4cefcf0d25211ac177115c6e67a29df696b49b67f5c86c3ed815fe5bcdb190c5369f3ef973a056ce9b02c89d00deedd836d771f1f03849b1b6a780332688a976a88867f6aad57cd6eba83e1418ce33ceae909021679be746cd41ce171b3ff752f6059045c0e1331e761244ce3779c9ccfe72f8dee7f4a83e0e8f06c8779f28558ec20fd5c65d2b9dad1f39c94df8605f7030ca1d8c95fdb969b0ed", &(0x7f0000000640)=""/88, &(0x7f0000000300)="adca6a27e4ec1924bd99e3f2db", &(0x7f00000006c0)="e835aeff58060f457fe476cd26bfc7cfe8871534f4f11b9e4e63a0424176014b8d20010bb56c4331a45cc1a6c39cd64e9eb68894fe9ebf3664e4e6b01eae3938e2fb355de786dcb7c0f145258349305ee11a806054e0a0116c608cca0ec123bf5b97c77999e4d6397d135bd54428f487c9f1be36d58e59d77168d163f04407cf83d011590ae0e6dd481566436f4cb210b63de9c12fc3860e45d52148f6e6f61b2991bad99a3d8c1a40fc31", 0x8, r1, 0x4}, 0x38) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x58}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1a, 0x14, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x0, 0x1, 0x3, 0x5, 0x7, 0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x30}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x777, 0x0, 0x0, 0x0, 0x98}]}, &(0x7f0000000440)='syzkaller\x00', 0x1, 0xb1, &(0x7f0000000840)=""/177, 0x41000, 0x40, '\x00', 0x0, @tracing=0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0x9, 0x7ff, 0x2}, 0x10, 0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0x10, 0x6073c6bf}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x11}) r11 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r11, 0x1, 0x7, &(0x7f0000000180), 0x43) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x4, 0x4, &(0x7f00000002c0)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x40}]}, &(0x7f0000000100)='GPL\x00'}, 0x2a) socket$kcm(0x10, 0x2, 0x4) 882.011119ms ago: executing program 3 (id=3851): perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x80, 0xffff, 0x0, 0x0, 0xfbf, 0x7, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000080000000000000064ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001440)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x8, 0x0, 0xfffffffffffffffd}}, 0x10) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async, rerun: 64) socket$kcm(0xa, 0x2, 0x3a) (rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) (async) socketpair(0x2, 0x5, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz1\x00', 0x1ff) (async, rerun: 32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 32) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5c, '\x00', 0x0, @fallback=0x2b}, 0x94) (async) openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0x1) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x4, 0x1, 0x0, 0x7ff2, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_bp={&(0x7f0000000180), 0x2}, 0x14141, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x4, &(0x7f0000000c80)=@framed={{}, [@ldst={0x5c6ccd1daf94070, 0x1, 0x2, 0x0, 0x8, 0x6}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) (async, rerun: 64) r4 = socket$kcm(0x25, 0x1, 0x0) (rerun: 64) recvmsg$kcm(r4, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x40010102) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={0xffffffffffffffff, &(0x7f0000000580), &(0x7f0000001580)=""/92}, 0x20) (rerun: 64) r5 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r5, 0x29, 0x4a, 0x0, 0x356422d70f279a34) (async, rerun: 32) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) (rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) 754.903497ms ago: executing program 4 (id=3852): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x2, 0x9, 0x4, 0x1, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x4, 0x40000000}, 0x80, 0x0}, 0x0) 557.234448ms ago: executing program 0 (id=3853): r0 = socket$kcm(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xfffffedf, 0x10, &(0x7f0000000040), 0xffffff95, 0x0, 0xffffffffffffffff, 0xd}, 0x48) r2 = perf_event_open(&(0x7f00000014c0)={0x5, 0x80, 0x0, 0xff, 0xff, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x1590, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8808, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x3, 0x0, 0x6, 0x7, 0xffffffff, 0x802, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x19) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0x3, 0x300) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) r8 = socket$kcm(0xa, 0x2, 0x73) recvmsg(r8, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x40010123) recvmsg(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000002400)=""/4098, 0x1002}], 0x1}, 0x0) r9 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r9, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0x12, 0x1, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x4000}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x248, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r11, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)=r10}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r12, &(0x7f00000001c0), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x2000000, 0x5e, 0xfffffe40, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0xc69a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x50) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4a22, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x0, 0x1, 0x3d, 0x401}}], 0x18}, 0x4008010) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) 0s ago: executing program 1 (id=3854): perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, 0x0, 0x15b76fa0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x3, 0x0, 0x3}, 0x10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0xbaa}, 0x48) r1 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)=""/43, 0x2b}], 0x1}, 0x82) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60284c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x84800) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext, 0x101000, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x3d, 0x0, 0x1, 0x20}, {0x4d}, {0x6, 0x0, 0xfe}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0x2, 0x0) close(r6) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0xffffffffffffffff, 0x1, 0x2000}}, 0x10, 0x0}, 0x4040000) socket$kcm(0xa, 0x6, 0x0) kernel console output (not intermixed with test programs): 7465][T13734] ? lockdep_hardirqs_on+0x94/0x140 [ 401.782708][T13734] do_syscall_64+0x4c/0xa0 [ 401.787328][T13734] ? clear_bhb_loop+0x30/0x80 [ 401.792052][T13734] ? clear_bhb_loop+0x30/0x80 [ 401.796777][T13734] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 401.802720][T13734] RIP: 0033:0x7f08c989258e [ 401.807178][T13734] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 401.826937][T13734] RSP: 002b:00007f08c7b2cfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 401.835385][T13734] RAX: ffffffffffffffda RBX: 00007f08c7b2d6c0 RCX: 00007f08c989258e [ 401.843382][T13734] RDX: 000000000000000f RSI: 00007f08c7b2d0a0 RDI: 0000000000000004 [ 401.851382][T13734] RBP: 00007f08c7b2d090 R08: 0000000000000000 R09: 0000000000000000 [ 401.859542][T13734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 401.867563][T13734] R13: 00007f08c9b4d038 R14: 00007f08c9b4cfa0 R15: 00007ffd296521e8 [ 401.875668][T13734] [ 402.186107][T13737] device wlan0 entered promiscuous mode [ 402.588733][T13752] netlink: 132 bytes leftover after parsing attributes in process `syz.0.3304'. [ 402.666003][T13762] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3309'. [ 402.779487][T13766] netlink: 'syz.1.3308': attribute type 10 has an invalid length. [ 402.945492][T13769] netlink: 65039 bytes leftover after parsing attributes in process `syz.4.3311'. [ 402.955132][T13769] tc_dump_action: action bad kind [ 402.963454][T13769] netlink: 'syz.4.3311': attribute type 10 has an invalid length. [ 402.971705][T13769] netlink: 65015 bytes leftover after parsing attributes in process `syz.4.3311'. [ 403.347820][T13786] netlink: 156 bytes leftover after parsing attributes in process `syz.2.3317'. [ 403.608814][T13777] delete_channel: no stack [ 403.871686][T13801] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3322'. [ 403.973966][T13803] netlink: 'syz.0.3324': attribute type 10 has an invalid length. [ 404.159410][T13812] netlink: 207496 bytes leftover after parsing attributes in process `syz.3.3328'. [ 404.339353][T13812] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 404.776457][T13833] netlink: 'syz.0.3338': attribute type 1 has an invalid length. [ 405.000203][T13839] netlink: 'syz.4.3339': attribute type 10 has an invalid length. [ 406.279659][T13869] netlink: 'syz.2.3351': attribute type 9 has an invalid length. [ 406.360633][T13869] __nla_validate_parse: 7 callbacks suppressed [ 406.360657][T13869] netlink: 154020 bytes leftover after parsing attributes in process `syz.2.3351'. [ 406.389922][T13872] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3352'. [ 406.416954][T13873] netlink: 'syz.1.3354': attribute type 10 has an invalid length. [ 406.470711][T13875] netlink: 'syz.4.3353': attribute type 1 has an invalid length. [ 406.609986][T13875] netlink: 191376 bytes leftover after parsing attributes in process `syz.4.3353'. [ 406.671942][T13887] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3357'. [ 406.817632][T13894] FAULT_INJECTION: forcing a failure. [ 406.817632][T13894] name failslab, interval 1, probability 0, space 0, times 0 [ 406.863010][T13896] netlink: 'syz.3.3361': attribute type 10 has an invalid length. [ 406.904092][T13896] netlink: 40 bytes leftover after parsing attributes in process `syz.3.3361'. [ 406.939752][T13894] CPU: 1 PID: 13894 Comm: syz.2.3360 Not tainted syzkaller #0 [ 406.947290][T13894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 406.957385][T13894] Call Trace: [ 406.960785][T13894] [ 406.963746][T13894] dump_stack_lvl+0x188/0x250 [ 406.968467][T13894] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 406.974671][T13894] ? show_regs_print_info+0x20/0x20 [ 406.979913][T13894] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 406.986133][T13894] should_fail+0x38c/0x4c0 [ 406.990596][T13894] should_failslab+0x5/0x20 [ 406.995143][T13894] slab_pre_alloc_hook+0x51/0xc0 [ 407.000120][T13894] kmem_cache_alloc_node+0x47/0x2d0 [ 407.005349][T13894] ? __alloc_skb+0xf4/0x750 [ 407.009901][T13894] __alloc_skb+0xf4/0x750 [ 407.014273][T13894] sk_stream_alloc_skb+0x1fa/0xa60 [ 407.019426][T13894] tcp_sendmsg_locked+0xc4e/0x35f0 [ 407.024575][T13894] ? aa_sk_perm+0x910/0x910 [ 407.029226][T13894] ? mark_lock+0x94/0x320 [ 407.033607][T13894] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 407.039667][T13894] ? tcp_free_fastopen_req+0x70/0x70 [ 407.045019][T13894] tcp_sendmsg+0x2b/0x40 [ 407.049315][T13894] ? inet_send_prepare+0x260/0x260 [ 407.054476][T13894] ____sys_sendmsg+0x5b7/0x8f0 [ 407.059288][T13894] ? __sys_sendmsg_sock+0x30/0x30 [ 407.064361][T13894] ? import_iovec+0x6f/0xa0 [ 407.068909][T13894] ___sys_sendmsg+0x236/0x2e0 [ 407.073641][T13894] ? __sys_sendmsg+0x2a0/0x2a0 [ 407.078462][T13894] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 407.084693][T13894] __se_sys_sendmsg+0x1af/0x290 [ 407.089587][T13894] ? __x64_sys_sendmsg+0x80/0x80 [ 407.094566][T13894] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 407.100604][T13894] ? lockdep_hardirqs_on+0x94/0x140 [ 407.106118][T13894] do_syscall_64+0x4c/0xa0 [ 407.110567][T13894] ? clear_bhb_loop+0x30/0x80 [ 407.115277][T13894] ? clear_bhb_loop+0x30/0x80 [ 407.119991][T13894] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 407.125967][T13894] RIP: 0033:0x7fb251fc5cb9 [ 407.130414][T13894] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 407.150056][T13894] RSP: 002b:00007fb250221028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 407.159053][T13894] RAX: ffffffffffffffda RBX: 00007fb252240fa0 RCX: 00007fb251fc5cb9 [ 407.167073][T13894] RDX: 00000000000052cc RSI: 0000200000000040 RDI: 0000000000000007 [ 407.175166][T13894] RBP: 00007fb250221090 R08: 0000000000000000 R09: 0000000000000000 [ 407.183220][T13894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.191225][T13894] R13: 00007fb252241038 R14: 00007fb252240fa0 R15: 00007fff85cde4a8 [ 407.199255][T13894] [ 407.233825][T13896] device team0 entered promiscuous mode [ 407.239485][T13896] device team_slave_0 entered promiscuous mode [ 407.253280][T13896] device team_slave_1 entered promiscuous mode [ 407.260331][T13896] bridge0: port 3(team0) entered blocking state [ 407.293498][T13896] bridge0: port 3(team0) entered disabled state [ 407.302837][T13896] bridge0: port 3(team0) entered blocking state [ 407.309289][T13896] bridge0: port 3(team0) entered forwarding state [ 407.330021][T13901] IPv6: Can't replace route, no match found [ 407.624670][T13909] netlink: 'syz.2.3367': attribute type 10 has an invalid length. [ 407.723728][T13909] device hsr_slave_0 left promiscuous mode [ 407.760182][T13909] device hsr_slave_1 left promiscuous mode [ 407.851839][T13920] netlink: 9275 bytes leftover after parsing attributes in process `syz.0.3370'. [ 408.406219][T13931] FAULT_INJECTION: forcing a failure. [ 408.406219][T13931] name failslab, interval 1, probability 0, space 0, times 0 [ 408.425963][T13931] CPU: 0 PID: 13931 Comm: syz.2.3375 Not tainted syzkaller #0 [ 408.433508][T13931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 408.443609][T13931] Call Trace: [ 408.446929][T13931] [ 408.449895][T13931] dump_stack_lvl+0x188/0x250 [ 408.454710][T13931] ? show_regs_print_info+0x20/0x20 [ 408.459976][T13931] ? load_image+0x400/0x400 [ 408.464537][T13931] ? __might_sleep+0xf0/0xf0 [ 408.469195][T13931] ? __lock_acquire+0x7d10/0x7d10 [ 408.474284][T13931] should_fail+0x38c/0x4c0 [ 408.478764][T13931] should_failslab+0x5/0x20 [ 408.483300][T13931] slab_pre_alloc_hook+0x51/0xc0 [ 408.488282][T13931] __kmalloc+0x6b/0x330 [ 408.492487][T13931] ? tomoyo_realpath_from_path+0x118/0x610 [ 408.498353][T13931] tomoyo_realpath_from_path+0x118/0x610 [ 408.504070][T13931] tomoyo_path_number_perm+0x242/0x660 [ 408.509582][T13931] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 408.515199][T13931] security_file_ioctl+0x6c/0xa0 [ 408.520191][T13931] __se_sys_ioctl+0x48/0x170 [ 408.524826][T13931] do_syscall_64+0x4c/0xa0 [ 408.529280][T13931] ? clear_bhb_loop+0x30/0x80 [ 408.533993][T13931] ? clear_bhb_loop+0x30/0x80 [ 408.538715][T13931] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 408.544645][T13931] RIP: 0033:0x7fb251fc5cb9 [ 408.549092][T13931] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 408.568747][T13931] RSP: 002b:00007fb250221028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 408.577206][T13931] RAX: ffffffffffffffda RBX: 00007fb252240fa0 RCX: 00007fb251fc5cb9 [ 408.585309][T13931] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000004 [ 408.593310][T13931] RBP: 00007fb250221090 R08: 0000000000000000 R09: 0000000000000000 [ 408.601316][T13931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.609312][T13931] R13: 00007fb252241038 R14: 00007fb252240fa0 R15: 00007fff85cde4a8 [ 408.617350][T13931] [ 408.647645][T13931] ERROR: Out of memory at tomoyo_realpath_from_path. [ 408.912291][T13943] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3381'. [ 408.962130][T13948] netlink: 'syz.2.3383': attribute type 10 has an invalid length. [ 410.013460][T13968] netlink: 64 bytes leftover after parsing attributes in process `syz.0.3390'. [ 410.131030][T13965] device wlan0 entered promiscuous mode [ 410.822742][T13990] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3396'. [ 411.231819][T13992] netlink: 'syz.0.3397': attribute type 10 has an invalid length. [ 411.663395][T13993] device syzkaller0 entered promiscuous mode [ 411.699078][T14009] netlink: 'syz.0.3402': attribute type 12 has an invalid length. [ 411.727625][T14009] netlink: 132 bytes leftover after parsing attributes in process `syz.0.3402'. [ 411.814274][T14005] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 412.019121][T14012] netlink: 'syz.3.3403': attribute type 3 has an invalid length. [ 412.046979][T14017] IPv6: Can't replace route, no match found [ 412.211859][T14026] FAULT_INJECTION: forcing a failure. [ 412.211859][T14026] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 412.269271][T14026] CPU: 0 PID: 14026 Comm: syz.0.3408 Not tainted syzkaller #0 [ 412.276819][T14026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 412.286920][T14026] Call Trace: [ 412.290241][T14026] [ 412.293213][T14026] dump_stack_lvl+0x188/0x250 [ 412.297952][T14026] ? show_regs_print_info+0x20/0x20 [ 412.303210][T14026] ? load_image+0x400/0x400 [ 412.307778][T14026] ? __lock_acquire+0x7d10/0x7d10 [ 412.312855][T14026] ? lock_chain_count+0x20/0x20 [ 412.317769][T14026] should_fail+0x38c/0x4c0 [ 412.322241][T14026] prepare_alloc_pages+0x1e4/0x5f0 [ 412.327415][T14026] __alloc_pages+0x11b/0x480 [ 412.332053][T14026] ? zone_statistics+0x170/0x170 [ 412.337042][T14026] ? copy_page_from_iter+0x49d/0x760 [ 412.342386][T14026] ? alloc_pages+0x438/0x550 [ 412.347033][T14026] pipe_write+0x5d2/0x1aa0 [ 412.351523][T14026] ? pipe_write+0x1c1/0x1aa0 [ 412.356181][T14026] ? pipe_read+0x1260/0x1260 [ 412.360819][T14026] ? end_current_label_crit_section+0x14b/0x170 [ 412.367198][T14026] ? memset+0x1e/0x40 [ 412.371223][T14026] ? iov_iter_init+0xb4/0x170 [ 412.375945][T14026] vfs_write+0x745/0xd60 [ 412.380238][T14026] ? file_end_write+0x250/0x250 [ 412.385150][T14026] ? __fget_files+0x40f/0x480 [ 412.389893][T14026] ? __fdget_pos+0x1e2/0x370 [ 412.394566][T14026] ? ksys_write+0x71/0x260 [ 412.399035][T14026] ksys_write+0x152/0x260 [ 412.403423][T14026] ? __ia32_sys_read+0x80/0x80 [ 412.408270][T14026] ? lockdep_hardirqs_on+0x94/0x140 [ 412.413517][T14026] do_syscall_64+0x4c/0xa0 [ 412.417971][T14026] ? clear_bhb_loop+0x30/0x80 [ 412.422695][T14026] ? clear_bhb_loop+0x30/0x80 [ 412.427425][T14026] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 412.433361][T14026] RIP: 0033:0x7f80bafe5cb9 [ 412.437819][T14026] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 412.457475][T14026] RSP: 002b:00007f80b9241028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 412.465943][T14026] RAX: ffffffffffffffda RBX: 00007f80bb260fa0 RCX: 00007f80bafe5cb9 [ 412.473956][T14026] RDX: 000000000000fdef RSI: 00002000000004c0 RDI: 0000000000000000 [ 412.481975][T14026] RBP: 00007f80b9241090 R08: 0000000000000000 R09: 0000000000000000 [ 412.489989][T14026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 412.498005][T14026] R13: 00007f80bb261038 R14: 00007f80bb260fa0 R15: 00007ffe142d0268 [ 412.506065][T14026] [ 412.738493][T14031] netlink: 'syz.3.3412': attribute type 10 has an invalid length. [ 412.756672][T14029] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3410'. [ 413.145601][T14049] netlink: 55631 bytes leftover after parsing attributes in process `syz.3.3417'. [ 413.286786][T14049] netlink: 6328 bytes leftover after parsing attributes in process `syz.3.3417'. [ 413.373588][T14049] tc_dump_action: action bad kind [ 413.549143][T14058] syzkaller0: tun_chr_ioctl cmd 1074025688 [ 413.564998][T14057] netlink: 'syz.0.3419': attribute type 29 has an invalid length. [ 413.601005][T14057] netlink: 'syz.0.3419': attribute type 29 has an invalid length. [ 413.643916][T14060] netlink: 'syz.0.3419': attribute type 29 has an invalid length. [ 413.861565][T14060] netlink: 'syz.0.3419': attribute type 29 has an invalid length. [ 413.919474][T14062] netlink: 'syz.0.3419': attribute type 29 has an invalid length. [ 413.968600][T14060] netlink: 'syz.0.3419': attribute type 29 has an invalid length. [ 414.155893][T14057] netlink: 'syz.0.3419': attribute type 29 has an invalid length. [ 414.359621][T14073] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3425'. [ 414.534190][T14085] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3428'. [ 414.563446][T14085] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3428'. [ 414.573944][T14080] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3428'. [ 414.805362][T14101] FAULT_INJECTION: forcing a failure. [ 414.805362][T14101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 414.889115][T14101] CPU: 1 PID: 14101 Comm: syz.3.3435 Not tainted syzkaller #0 [ 414.896644][T14101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 414.906724][T14101] Call Trace: [ 414.910028][T14101] [ 414.912996][T14101] dump_stack_lvl+0x188/0x250 [ 414.917716][T14101] ? show_regs_print_info+0x20/0x20 [ 414.922945][T14101] ? load_image+0x400/0x400 [ 414.927472][T14101] ? __lock_acquire+0x7d10/0x7d10 [ 414.932519][T14101] should_fail+0x38c/0x4c0 [ 414.936959][T14101] _copy_from_user+0x2e/0x170 [ 414.941681][T14101] __copy_msghdr_from_user+0xc9/0x630 [ 414.947078][T14101] ? verify_lock_unused+0x140/0x140 [ 414.952299][T14101] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 414.957611][T14101] ? perf_tp_event+0xa92/0xbf0 [ 414.962430][T14101] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 414.968258][T14101] ___sys_sendmsg+0x19a/0x2e0 [ 414.973185][T14101] ? __sys_sendmsg+0x2a0/0x2a0 [ 414.978016][T14101] __se_sys_sendmsg+0x1af/0x290 [ 414.982900][T14101] ? __x64_sys_sendmsg+0x80/0x80 [ 414.987868][T14101] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 414.993886][T14101] ? lockdep_hardirqs_on+0x94/0x140 [ 414.999115][T14101] do_syscall_64+0x4c/0xa0 [ 415.003549][T14101] ? clear_bhb_loop+0x30/0x80 [ 415.008244][T14101] ? clear_bhb_loop+0x30/0x80 [ 415.012943][T14101] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 415.018862][T14101] RIP: 0033:0x7fea82dfecb9 [ 415.023473][T14101] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 415.043099][T14101] RSP: 002b:00007fea8105a028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 415.051560][T14101] RAX: ffffffffffffffda RBX: 00007fea83079fa0 RCX: 00007fea82dfecb9 [ 415.059563][T14101] RDX: 0000000000004040 RSI: 0000200000000000 RDI: 0000000000000003 [ 415.067555][T14101] RBP: 00007fea8105a090 R08: 0000000000000000 R09: 0000000000000000 [ 415.075587][T14101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.083584][T14101] R13: 00007fea8307a038 R14: 00007fea83079fa0 R15: 00007ffc52ee84b8 [ 415.091591][T14101] [ 415.236332][T14115] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3438'. [ 415.327426][T14116] netlink: 191376 bytes leftover after parsing attributes in process `syz.1.3437'. [ 415.472714][T14124] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.654345][T14139] FAULT_INJECTION: forcing a failure. [ 415.654345][T14139] name failslab, interval 1, probability 0, space 0, times 0 [ 415.811668][T14139] CPU: 0 PID: 14139 Comm: syz.3.3448 Not tainted syzkaller #0 [ 415.819307][T14139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 415.829675][T14139] Call Trace: [ 415.833528][T14139] [ 415.836510][T14139] dump_stack_lvl+0x188/0x250 [ 415.841247][T14139] ? show_regs_print_info+0x20/0x20 [ 415.846500][T14139] ? load_image+0x400/0x400 [ 415.851047][T14139] ? __might_sleep+0xf0/0xf0 [ 415.855688][T14139] ? __lock_acquire+0x7d10/0x7d10 [ 415.860763][T14139] ? netlink_insert+0xe95/0x11f0 [ 415.865760][T14139] should_fail+0x38c/0x4c0 [ 415.870642][T14139] should_failslab+0x5/0x20 [ 415.875189][T14139] slab_pre_alloc_hook+0x51/0xc0 [ 415.880173][T14139] kmem_cache_alloc_node+0x47/0x2d0 [ 415.885410][T14139] ? __alloc_skb+0xf4/0x750 [ 415.889949][T14139] __alloc_skb+0xf4/0x750 [ 415.894324][T14139] netlink_sendmsg+0x654/0xbe0 [ 415.899127][T14139] ? netlink_getsockopt+0x570/0x570 [ 415.904445][T14139] ? aa_sock_msg_perm+0x94/0x150 [ 415.909415][T14139] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 415.914731][T14139] ? security_socket_sendmsg+0x7c/0xa0 [ 415.920215][T14139] ? netlink_getsockopt+0x570/0x570 [ 415.925442][T14139] ____sys_sendmsg+0x5b7/0x8f0 [ 415.930401][T14139] ? __sys_sendmsg_sock+0x30/0x30 [ 415.935468][T14139] ? import_iovec+0x6f/0xa0 [ 415.939999][T14139] ___sys_sendmsg+0x236/0x2e0 [ 415.944702][T14139] ? __sys_sendmsg+0x2a0/0x2a0 [ 415.949498][T14139] ? vfs_write+0x8b2/0xd60 [ 415.953959][T14139] __se_sys_sendmsg+0x1af/0x290 [ 415.958833][T14139] ? __x64_sys_sendmsg+0x80/0x80 [ 415.963791][T14139] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 415.969809][T14139] ? lockdep_hardirqs_on+0x94/0x140 [ 415.975050][T14139] do_syscall_64+0x4c/0xa0 [ 415.979498][T14139] ? clear_bhb_loop+0x30/0x80 [ 415.984200][T14139] ? clear_bhb_loop+0x30/0x80 [ 415.988900][T14139] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 415.994831][T14139] RIP: 0033:0x7fea82dfecb9 [ 415.999283][T14139] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 416.018926][T14139] RSP: 002b:00007fea8105a028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 416.027366][T14139] RAX: ffffffffffffffda RBX: 00007fea83079fa0 RCX: 00007fea82dfecb9 [ 416.035366][T14139] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000003 [ 416.043361][T14139] RBP: 00007fea8105a090 R08: 0000000000000000 R09: 0000000000000000 [ 416.051356][T14139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 416.059355][T14139] R13: 00007fea8307a038 R14: 00007fea83079fa0 R15: 00007ffc52ee84b8 [ 416.067369][T14139] [ 417.269904][T14198] bridge0: port 3(veth0_to_bridge) entered blocking state [ 417.294631][T14198] bridge0: port 3(veth0_to_bridge) entered disabled state [ 417.310820][T14198] device veth0_to_bridge entered promiscuous mode [ 417.339924][T14195] __nla_validate_parse: 3 callbacks suppressed [ 417.339959][T14195] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3469'. [ 417.383799][T14198] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.434970][T14198] bridge0: port 3(veth0_to_bridge) entered blocking state [ 417.442212][T14198] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 417.505024][T14204] validate_nla: 5 callbacks suppressed [ 417.505042][T14204] netlink: 'syz.3.3472': attribute type 1 has an invalid length. [ 417.570215][T14204] netlink: 191376 bytes leftover after parsing attributes in process `syz.3.3472'. [ 417.963039][T14228] netlink: 'syz.2.3480': attribute type 29 has an invalid length. [ 417.982553][T14228] netlink: 44 bytes leftover after parsing attributes in process `syz.2.3480'. [ 418.051781][T14228] netlink: 'syz.2.3480': attribute type 29 has an invalid length. [ 418.071333][T14228] netlink: 44 bytes leftover after parsing attributes in process `syz.2.3480'. [ 418.399669][T14238] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3483'. [ 419.070161][T14256] netlink: 'syz.4.3490': attribute type 1 has an invalid length. [ 419.154503][T14256] netlink: 191376 bytes leftover after parsing attributes in process `syz.4.3490'. [ 419.310337][T14260] netlink: 1057 bytes leftover after parsing attributes in process `syz.0.3492'. [ 419.717408][T14280] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3499'. [ 419.796141][T14286] netlink: 207496 bytes leftover after parsing attributes in process `syz.0.3502'. [ 420.093114][T14295] netlink: 'syz.4.3506': attribute type 1 has an invalid length. [ 420.121685][T14295] netlink: 191376 bytes leftover after parsing attributes in process `syz.4.3506'. [ 420.755821][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.768277][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.780676][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.793706][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.806109][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.818508][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.830962][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.843710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.856101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.868628][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.670960][T14333] netlink: 207496 bytes leftover after parsing attributes in process `syz.0.3515'. [ 423.175696][T14348] netlink: 'syz.1.3518': attribute type 1 has an invalid length. [ 423.254401][T14351] netlink: 'syz.0.3519': attribute type 10 has an invalid length. [ 423.334473][T14351] netlink: 55 bytes leftover after parsing attributes in process `syz.0.3519'. [ 423.343837][T14348] netlink: 191376 bytes leftover after parsing attributes in process `syz.1.3518'. [ 423.499898][T14357] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.3519'. [ 423.822516][T14366] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3523'. [ 425.293886][T14382] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.3530'. [ 425.502503][T14390] netlink: 132 bytes leftover after parsing attributes in process `syz.3.3532'. [ 425.604227][T14392] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3533'. [ 425.763350][ C1] net_ratelimit: 9770 callbacks suppressed [ 425.763368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.765834][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 425.770431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.781978][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 425.794053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.830038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.842478][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.851813][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 425.855516][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.867592][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.530078][T14406] netlink: 'syz.1.3539': attribute type 16 has an invalid length. [ 426.571881][T14406] netlink: 156 bytes leftover after parsing attributes in process `syz.1.3539'. [ 426.749942][T14408] FAULT_INJECTION: forcing a failure. [ 426.749942][T14408] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 426.800240][T14408] CPU: 0 PID: 14408 Comm: syz.1.3540 Not tainted syzkaller #0 [ 426.807777][T14408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 426.817898][T14408] Call Trace: [ 426.821212][T14408] [ 426.824168][T14408] dump_stack_lvl+0x188/0x250 [ 426.828886][T14408] ? show_regs_print_info+0x20/0x20 [ 426.834117][T14408] ? load_image+0x400/0x400 [ 426.838658][T14408] ? __lock_acquire+0x7d10/0x7d10 [ 426.843730][T14408] should_fail+0x38c/0x4c0 [ 426.848188][T14408] _copy_from_user+0x2e/0x170 [ 426.852893][T14408] iovec_from_user+0x142/0x370 [ 426.857697][T14408] __import_iovec+0x70/0x490 [ 426.862336][T14408] import_iovec+0x6f/0xa0 [ 426.866704][T14408] ___sys_sendmsg+0x1fd/0x2e0 [ 426.871422][T14408] ? __sys_sendmsg+0x2a0/0x2a0 [ 426.876231][T14408] ? trace_event_raw_event_lock+0x270/0x270 [ 426.882166][T14408] ? vfs_write+0x8b2/0xd60 [ 426.886740][T14408] __se_sys_sendmsg+0x1af/0x290 [ 426.891642][T14408] ? __x64_sys_sendmsg+0x80/0x80 [ 426.896625][T14408] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 426.902666][T14408] ? lockdep_hardirqs_on+0x94/0x140 [ 426.907904][T14408] do_syscall_64+0x4c/0xa0 [ 426.912355][T14408] ? clear_bhb_loop+0x30/0x80 [ 426.917077][T14408] ? clear_bhb_loop+0x30/0x80 [ 426.921793][T14408] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 426.927950][T14408] RIP: 0033:0x7f08c98d1cb9 [ 426.932403][T14408] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 426.952354][T14408] RSP: 002b:00007f08c7b2d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 426.960796][T14408] RAX: ffffffffffffffda RBX: 00007f08c9b4cfa0 RCX: 00007f08c98d1cb9 [ 426.968801][T14408] RDX: 0000000000000000 RSI: 0000200000000940 RDI: 0000000000000003 [ 426.976795][T14408] RBP: 00007f08c7b2d090 R08: 0000000000000000 R09: 0000000000000000 [ 426.984783][T14408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 426.992777][T14408] R13: 00007f08c9b4d038 R14: 00007f08c9b4cfa0 R15: 00007ffd296521e8 [ 427.000781][T14408] [ 427.161410][T14410] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3542'. [ 427.440909][T14414] netlink: 'syz.1.3543': attribute type 16 has an invalid length. [ 427.645614][T14419] netlink: 'syz.2.3545': attribute type 21 has an invalid length. [ 429.405150][T14429] __nla_validate_parse: 1 callbacks suppressed [ 429.405171][T14429] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3549'. [ 429.483252][T14429] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3549'. [ 429.568898][T14432] netlink: 'syz.2.3550': attribute type 10 has an invalid length. [ 429.588220][T14432] netlink: 601 bytes leftover after parsing attributes in process `syz.2.3550'. [ 429.821745][T14438] netlink: 188 bytes leftover after parsing attributes in process `syz.1.3551'. [ 429.894270][T14440] netlink: 'syz.0.3552': attribute type 10 has an invalid length. [ 429.916495][T14443] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3553'. [ 430.283668][T14453] netlink: 'syz.0.3558': attribute type 1 has an invalid length. [ 430.303413][T14453] netlink: 191376 bytes leftover after parsing attributes in process `syz.0.3558'. [ 430.625470][T14463] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3561'. [ 430.701973][T14463] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3561'. [ 430.773409][ C0] net_ratelimit: 7126 callbacks suppressed [ 430.773431][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.774425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.783149][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 430.792642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.804492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.817184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.831128][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 430.840634][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.852547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.865586][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.951798][T14476] netlink: 'syz.0.3564': attribute type 10 has an invalid length. [ 431.557999][T14476] team0: Port device dummy0 added [ 431.744892][T14482] netlink: 'syz.1.3566': attribute type 10 has an invalid length. [ 431.960969][T14488] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3567'. [ 431.990811][T14487] netlink: 'syz.2.3568': attribute type 10 has an invalid length. [ 432.160565][T14496] netlink: 188 bytes leftover after parsing attributes in process `syz.0.3569'. [ 432.256960][T14498] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 432.615043][T14512] netlink: 'syz.2.3574': attribute type 1 has an invalid length. [ 433.148884][T14532] device wg2 entered promiscuous mode [ 433.561919][T14543] device wlan0 entered promiscuous mode [ 433.710351][T14554] netlink: 'syz.3.3589': attribute type 1 has an invalid length. [ 434.164674][T14571] FAULT_INJECTION: forcing a failure. [ 434.164674][T14571] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 434.203169][T14571] CPU: 0 PID: 14571 Comm: syz.3.3594 Not tainted syzkaller #0 [ 434.210700][T14571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 434.220791][T14571] Call Trace: [ 434.224102][T14571] [ 434.227064][T14571] dump_stack_lvl+0x188/0x250 [ 434.231786][T14571] ? show_regs_print_info+0x20/0x20 [ 434.237022][T14571] ? load_image+0x400/0x400 [ 434.241566][T14571] ? __lock_acquire+0x7d10/0x7d10 [ 434.246628][T14571] ? unix_ioctl+0x25d/0x660 [ 434.251213][T14571] should_fail+0x38c/0x4c0 [ 434.255673][T14571] _copy_from_user+0x2e/0x170 [ 434.260391][T14571] sock_do_ioctl+0x18c/0x320 [ 434.265027][T14571] ? sock_show_fdinfo+0xb0/0xb0 [ 434.269934][T14571] sock_ioctl+0x4d2/0x710 [ 434.274306][T14571] ? sock_poll+0x410/0x410 [ 434.278775][T14571] ? bpf_lsm_file_ioctl+0x5/0x10 [ 434.283742][T14571] ? security_file_ioctl+0x7c/0xa0 [ 434.288888][T14571] ? sock_poll+0x410/0x410 [ 434.293343][T14571] __se_sys_ioctl+0xfa/0x170 [ 434.297966][T14571] do_syscall_64+0x4c/0xa0 [ 434.302418][T14571] ? clear_bhb_loop+0x30/0x80 [ 434.307120][T14571] ? clear_bhb_loop+0x30/0x80 [ 434.311836][T14571] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 434.317764][T14571] RIP: 0033:0x7fea82dfecb9 [ 434.322214][T14571] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 434.341862][T14571] RSP: 002b:00007fea81039028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 434.350415][T14571] RAX: ffffffffffffffda RBX: 00007fea8307a090 RCX: 00007fea82dfecb9 [ 434.358429][T14571] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 434.366443][T14571] RBP: 00007fea81039090 R08: 0000000000000000 R09: 0000000000000000 [ 434.374450][T14571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.382482][T14571] R13: 00007fea8307a128 R14: 00007fea8307a090 R15: 00007ffc52ee84b8 [ 434.390506][T14571] [ 435.783385][ C1] net_ratelimit: 9905 callbacks suppressed [ 435.783406][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.784765][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 435.790002][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.802341][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.814733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.828270][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 435.838647][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.850567][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.863601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.876824][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 438.057945][T14590] __nla_validate_parse: 4 callbacks suppressed [ 438.057965][T14590] netlink: 132 bytes leftover after parsing attributes in process `syz.0.3601'. [ 438.278972][T14597] netlink: 'syz.4.3602': attribute type 1 has an invalid length. [ 438.330695][T14597] netlink: 191376 bytes leftover after parsing attributes in process `syz.4.3602'. [ 438.809876][T14612] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.3608'. [ 439.024945][T14625] FAULT_INJECTION: forcing a failure. [ 439.024945][T14625] name failslab, interval 1, probability 0, space 0, times 0 [ 439.038124][T14625] CPU: 1 PID: 14625 Comm: syz.1.3612 Not tainted syzkaller #0 [ 439.045623][T14625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 439.055799][T14625] Call Trace: [ 439.059116][T14625] [ 439.062185][T14625] dump_stack_lvl+0x188/0x250 [ 439.066913][T14625] ? trace_event_raw_event_lock_acquire+0x2b0/0x2b0 [ 439.073540][T14625] ? show_regs_print_info+0x20/0x20 [ 439.078775][T14625] ? load_image+0x400/0x400 [ 439.083331][T14625] ? perf_trace_lock_acquire+0xed/0x3e0 [ 439.089031][T14625] should_fail+0x38c/0x4c0 [ 439.093503][T14625] should_failslab+0x5/0x20 [ 439.098039][T14625] slab_pre_alloc_hook+0x51/0xc0 [ 439.103020][T14625] ? skb_clone+0x1bd/0x350 [ 439.107474][T14625] kmem_cache_alloc+0x3d/0x290 [ 439.112292][T14625] skb_clone+0x1bd/0x350 [ 439.116577][T14625] ? dev_queue_xmit_nit+0x1df/0xb00 [ 439.121824][T14625] dev_queue_xmit_nit+0x2cc/0xb00 [ 439.126891][T14625] ? validate_xmit_skb+0x7b3/0xe40 [ 439.126940][T14625] dev_hard_start_xmit+0x13e/0x7e0 [ 439.126979][T14625] __dev_queue_xmit+0x1a78/0x2fd0 [ 439.142491][T14625] ? dev_queue_xmit+0x20/0x20 [ 439.147214][T14625] ? memcpy+0x3c/0x60 [ 439.151251][T14625] ? __copy_skb_header+0x3ba/0x4f0 [ 439.156419][T14625] ? __skb_clone+0x480/0x790 [ 439.161061][T14625] ? skb_clone+0x1f1/0x350 [ 439.165518][T14625] __netlink_deliver_tap+0x53e/0x7c0 [ 439.170858][T14625] netlink_deliver_tap+0x16c/0x180 [ 439.176005][T14625] netlink_unicast+0x74f/0x920 [ 439.180822][T14625] netlink_sendmsg+0x8ba/0xbe0 [ 439.185637][T14625] ? netlink_getsockopt+0x570/0x570 [ 439.190881][T14625] ? aa_sock_msg_perm+0x94/0x150 [ 439.195864][T14625] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 439.201193][T14625] ? security_socket_sendmsg+0x7c/0xa0 [ 439.206699][T14625] ? netlink_getsockopt+0x570/0x570 [ 439.211935][T14625] ____sys_sendmsg+0x5b7/0x8f0 [ 439.216758][T14625] ? __sys_sendmsg_sock+0x30/0x30 [ 439.221841][T14625] ? import_iovec+0x6f/0xa0 [ 439.226391][T14625] ___sys_sendmsg+0x236/0x2e0 [ 439.231122][T14625] ? __sys_sendmsg+0x2a0/0x2a0 [ 439.235946][T14625] ? vfs_write+0x8b2/0xd60 [ 439.240433][T14625] __se_sys_sendmsg+0x1af/0x290 [ 439.245329][T14625] ? __x64_sys_sendmsg+0x80/0x80 [ 439.250304][T14625] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 439.256347][T14625] ? lockdep_hardirqs_on+0x94/0x140 [ 439.261599][T14625] do_syscall_64+0x4c/0xa0 [ 439.266057][T14625] ? clear_bhb_loop+0x30/0x80 [ 439.270764][T14625] ? clear_bhb_loop+0x30/0x80 [ 439.275476][T14625] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 439.281418][T14625] RIP: 0033:0x7f08c98d1cb9 [ 439.285903][T14625] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 439.305634][T14625] RSP: 002b:00007f08c7b2d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 439.314111][T14625] RAX: ffffffffffffffda RBX: 00007f08c9b4cfa0 RCX: 00007f08c98d1cb9 [ 439.322431][T14625] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 439.330474][T14625] RBP: 00007f08c7b2d090 R08: 0000000000000000 R09: 0000000000000000 [ 439.338593][T14625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 439.346982][T14625] R13: 00007f08c9b4d038 R14: 00007f08c9b4cfa0 R15: 00007ffd296521e8 [ 439.355244][T14625] [ 440.029628][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.036231][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 440.449050][T14656] netlink: 'syz.0.3620': attribute type 1 has an invalid length. [ 440.559518][T14656] netlink: 191376 bytes leftover after parsing attributes in process `syz.0.3620'. [ 440.816076][ C0] net_ratelimit: 9506 callbacks suppressed [ 440.816093][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 440.835489][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 440.846259][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.851436][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 440.860989][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.872730][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 440.885522][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.900680][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 440.910267][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.922057][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.049302][T14672] syz.1.3624[14672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.049447][T14672] syz.1.3624[14672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.712892][T14685] netlink: 164 bytes leftover after parsing attributes in process `syz.2.3627'. [ 441.876475][T14690] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3630'. [ 442.094024][T14698] netlink: 'syz.4.3632': attribute type 6 has an invalid length. [ 442.135693][T14698] netlink: 140 bytes leftover after parsing attributes in process `syz.4.3632'. [ 443.596457][T14737] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3642'. [ 443.686129][T14740] netlink: 55631 bytes leftover after parsing attributes in process `syz.4.3643'. [ 444.622106][T14749] netlink: 4595 bytes leftover after parsing attributes in process `syz.2.3645'. [ 445.412577][T14775] netlink: 'syz.4.3655': attribute type 1 has an invalid length. [ 445.493621][T14780] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3656'. [ 445.601950][T14775] netlink: 191376 bytes leftover after parsing attributes in process `syz.4.3655'. [ 445.823422][ C1] net_ratelimit: 7438 callbacks suppressed [ 445.823441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 445.824644][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 445.830680][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 445.842836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 445.855276][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 445.873534][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 445.878642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 445.891109][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 445.903808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 445.918645][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 446.056899][T14788] netlink: 'syz.2.3658': attribute type 10 has an invalid length. [ 446.506252][T14807] netlink: 207496 bytes leftover after parsing attributes in process `syz.4.3663'. [ 446.535356][T14808] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3666'. [ 446.773490][T14803] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 447.103603][T14808] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3666'. [ 447.299614][T14819] FAULT_INJECTION: forcing a failure. [ 447.299614][T14819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.357957][T14819] CPU: 0 PID: 14819 Comm: syz.2.3667 Not tainted syzkaller #0 [ 447.365489][T14819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 447.375585][T14819] Call Trace: [ 447.378897][T14819] [ 447.381864][T14819] dump_stack_lvl+0x188/0x250 [ 447.386593][T14819] ? show_regs_print_info+0x20/0x20 [ 447.391837][T14819] ? load_image+0x400/0x400 [ 447.396386][T14819] ? __might_sleep+0xf0/0xf0 [ 447.401097][T14819] ? __lock_acquire+0x7d10/0x7d10 [ 447.406162][T14819] ? mark_lock+0x94/0x320 [ 447.410533][T14819] should_fail+0x38c/0x4c0 [ 447.415064][T14819] copy_page_from_iter+0x33c/0x760 [ 447.420248][T14819] pipe_write+0x96f/0x1aa0 [ 447.424736][T14819] ? pipe_write+0x1c1/0x1aa0 [ 447.429397][T14819] ? pipe_read+0x1260/0x1260 [ 447.434127][T14819] ? end_current_label_crit_section+0x14b/0x170 [ 447.440414][T14819] ? memset+0x1e/0x40 [ 447.444533][T14819] ? iov_iter_init+0xb4/0x170 [ 447.449253][T14819] vfs_write+0x745/0xd60 [ 447.453599][T14819] ? file_end_write+0x250/0x250 [ 447.458496][T14819] ? __fget_files+0x40f/0x480 [ 447.463219][T14819] ? __fdget_pos+0x1e2/0x370 [ 447.467856][T14819] ? ksys_write+0x71/0x260 [ 447.472328][T14819] ksys_write+0x152/0x260 [ 447.476721][T14819] ? __ia32_sys_read+0x80/0x80 [ 447.482140][T14819] ? lockdep_hardirqs_on+0x94/0x140 [ 447.487386][T14819] do_syscall_64+0x4c/0xa0 [ 447.491837][T14819] ? clear_bhb_loop+0x30/0x80 [ 447.496652][T14819] ? clear_bhb_loop+0x30/0x80 [ 447.501368][T14819] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 447.507299][T14819] RIP: 0033:0x7fb251fc5cb9 [ 447.511852][T14819] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 447.531593][T14819] RSP: 002b:00007fb250221028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 447.540054][T14819] RAX: ffffffffffffffda RBX: 00007fb252240fa0 RCX: 00007fb251fc5cb9 [ 447.548069][T14819] RDX: 0000000000033fe0 RSI: 0000200000000000 RDI: 0000000000000000 [ 447.556181][T14819] RBP: 00007fb250221090 R08: 0000000000000000 R09: 0000000000000000 [ 447.564194][T14819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 447.572217][T14819] R13: 00007fb252241038 R14: 00007fb252240fa0 R15: 00007fff85cde4a8 [ 447.580246][T14819] [ 447.812773][T14828] netlink: 'syz.2.3669': attribute type 10 has an invalid length. [ 447.871447][T14825] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3668'. [ 448.222283][T14838] netlink: 'syz.1.3673': attribute type 1 has an invalid length. [ 448.307817][T14838] netlink: 191376 bytes leftover after parsing attributes in process `syz.1.3673'. [ 448.412094][T14848] netlink: 'syz.4.3677': attribute type 10 has an invalid length. [ 448.648008][T14855] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 448.985793][T14865] __nla_validate_parse: 1 callbacks suppressed [ 448.985834][T14865] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3682'. [ 449.261664][T14880] netlink: 209820 bytes leftover after parsing attributes in process `syz.4.3687'. [ 449.325449][T14879] netlink: 'syz.3.3688': attribute type 1 has an invalid length. [ 449.378663][T14879] netlink: 191376 bytes leftover after parsing attributes in process `syz.3.3688'. [ 449.935219][T14894] FAULT_INJECTION: forcing a failure. [ 449.935219][T14894] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 450.224394][T14894] CPU: 0 PID: 14894 Comm: syz.2.3692 Not tainted syzkaller #0 [ 450.231926][T14894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 450.242196][T14894] Call Trace: [ 450.245596][T14894] [ 450.248554][T14894] dump_stack_lvl+0x188/0x250 [ 450.253282][T14894] ? show_regs_print_info+0x20/0x20 [ 450.258513][T14894] ? load_image+0x400/0x400 [ 450.263058][T14894] ? __lock_acquire+0x7d10/0x7d10 [ 450.268129][T14894] should_fail+0x38c/0x4c0 [ 450.272587][T14894] _copy_from_iter+0x22e/0x1170 [ 450.277490][T14894] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 450.282912][T14894] packet_sendmsg+0x322c/0x5060 [ 450.287810][T14894] ? __lock_acquire+0x12e8/0x7d10 [ 450.293318][T14894] ? __might_sleep+0xf0/0xf0 [ 450.297958][T14894] ? aa_sk_perm+0x7dc/0x910 [ 450.302491][T14894] ? packet_getsockopt+0x9a0/0x9a0 [ 450.307653][T14894] ? aa_sock_msg_perm+0x94/0x150 [ 450.312630][T14894] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 450.317943][T14894] ? security_socket_sendmsg+0x7c/0xa0 [ 450.323455][T14894] ? packet_getsockopt+0x9a0/0x9a0 [ 450.328605][T14894] ____sys_sendmsg+0x5b7/0x8f0 [ 450.333416][T14894] ? __sys_sendmsg_sock+0x30/0x30 [ 450.338486][T14894] ? import_iovec+0x6f/0xa0 [ 450.343023][T14894] ___sys_sendmsg+0x236/0x2e0 [ 450.347744][T14894] ? __sys_sendmsg+0x2a0/0x2a0 [ 450.352557][T14894] ? vfs_write+0x8b2/0xd60 [ 450.357074][T14894] __se_sys_sendmsg+0x1af/0x290 [ 450.361963][T14894] ? __x64_sys_sendmsg+0x80/0x80 [ 450.366933][T14894] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 450.372963][T14894] ? lockdep_hardirqs_on+0x94/0x140 [ 450.378196][T14894] do_syscall_64+0x4c/0xa0 [ 450.382639][T14894] ? clear_bhb_loop+0x30/0x80 [ 450.387347][T14894] ? clear_bhb_loop+0x30/0x80 [ 450.392058][T14894] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 450.397977][T14894] RIP: 0033:0x7fb251fc5cb9 [ 450.402424][T14894] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 450.422057][T14894] RSP: 002b:00007fb250221028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 450.430506][T14894] RAX: ffffffffffffffda RBX: 00007fb252240fa0 RCX: 00007fb251fc5cb9 [ 450.438615][T14894] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000005 [ 450.446622][T14894] RBP: 00007fb250221090 R08: 0000000000000000 R09: 0000000000000000 [ 450.454627][T14894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 450.462624][T14894] R13: 00007fb252241038 R14: 00007fb252240fa0 R15: 00007fff85cde4a8 [ 450.470647][T14894] [ 450.834463][ C0] net_ratelimit: 5765 callbacks suppressed [ 450.834487][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 450.836890][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 450.840841][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 450.861314][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 450.875842][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 450.891266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 450.902372][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 450.904909][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 450.929169][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 450.939867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 452.321629][T14908] netlink: 207496 bytes leftover after parsing attributes in process `syz.0.3696'. [ 452.339714][T14910] netlink: 'syz.4.3695': attribute type 21 has an invalid length. [ 452.360779][T14910] netlink: 128 bytes leftover after parsing attributes in process `syz.4.3695'. [ 452.428221][T14910] netlink: 3 bytes leftover after parsing attributes in process `syz.4.3695'. [ 453.263322][T14921] netlink: 'syz.1.3700': attribute type 10 has an invalid length. [ 453.336231][T14923] netlink: 'syz.0.3701': attribute type 1 has an invalid length. [ 453.471057][T14923] netlink: 191376 bytes leftover after parsing attributes in process `syz.0.3701'. [ 453.491551][T14928] netlink: 'syz.4.3703': attribute type 17 has an invalid length. [ 453.569279][T14928] netlink: 148 bytes leftover after parsing attributes in process `syz.4.3703'. [ 454.858235][T14966] netlink: 207496 bytes leftover after parsing attributes in process `syz.1.3711'. [ 455.109003][T14972] netlink: 'syz.2.3714': attribute type 10 has an invalid length. [ 455.483578][T14983] netlink: 'syz.1.3717': attribute type 1 has an invalid length. [ 455.592083][T14983] netlink: 191376 bytes leftover after parsing attributes in process `syz.1.3717'. [ 455.603388][T14990] cgroup: fork rejected by pids controller in /syz2 [ 455.843612][ C1] net_ratelimit: 6527 callbacks suppressed [ 455.843632][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.845891][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 455.851038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.862608][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 455.875136][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.887492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 455.899248][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.914362][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 455.922842][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.935417][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.139748][T15119] dvmrp1: tun_chr_ioctl cmd 1074812117 [ 457.148413][T15114] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 457.199905][T15114] dvmrp1: linktype set to 772 [ 457.275498][T15122] netlink: 207496 bytes leftover after parsing attributes in process `syz.4.3727'. [ 457.753264][T15130] netlink: 207496 bytes leftover after parsing attributes in process `syz.0.3739'. [ 458.206737][T15134] netlink: 'syz.0.3730': attribute type 10 has an invalid length. [ 458.406153][T15139] netlink: 'syz.4.3732': attribute type 1 has an invalid length. [ 458.446994][T15139] netlink: 191376 bytes leftover after parsing attributes in process `syz.4.3732'. [ 458.672384][T15147] netlink: 830 bytes leftover after parsing attributes in process `syz.4.3733'. [ 458.696875][T15145] netlink: 'syz.0.3734': attribute type 10 has an invalid length. [ 458.705041][T15145] netlink: 210880 bytes leftover after parsing attributes in process `syz.0.3734'. [ 459.335060][T15160] netlink: 830 bytes leftover after parsing attributes in process `syz.4.3736'. [ 459.865893][T15168] FAULT_INJECTION: forcing a failure. [ 459.865893][T15168] name failslab, interval 1, probability 0, space 0, times 0 [ 459.903861][T15168] CPU: 0 PID: 15168 Comm: syz.0.3740 Not tainted syzkaller #0 [ 459.911415][T15168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 459.921526][T15168] Call Trace: [ 459.924853][T15168] [ 459.927831][T15168] dump_stack_lvl+0x188/0x250 [ 459.932580][T15168] ? show_regs_print_info+0x20/0x20 [ 459.937834][T15168] ? load_image+0x400/0x400 [ 459.942404][T15168] ? __might_sleep+0xf0/0xf0 [ 459.947061][T15168] ? __lock_acquire+0x7d10/0x7d10 [ 459.952148][T15168] ? __local_bh_enable_ip+0x136/0x1c0 [ 459.957594][T15168] should_fail+0x38c/0x4c0 [ 459.962090][T15168] should_failslab+0x5/0x20 [ 459.966640][T15168] slab_pre_alloc_hook+0x51/0xc0 [ 459.971645][T15168] kmem_cache_alloc_node_trace+0x4a/0x300 [ 459.977419][T15168] ? __get_vm_area_node+0x119/0x2d0 [ 459.982692][T15168] __get_vm_area_node+0x119/0x2d0 [ 459.987802][T15168] __vmalloc_node_range+0xef/0x8b0 [ 459.992972][T15168] ? netlink_sendmsg+0x5ec/0xbe0 [ 459.997964][T15168] ? netlink_data_ready+0x10/0x10 [ 460.003072][T15168] ? netlink_sendmsg+0x5ec/0xbe0 [ 460.008061][T15168] vmalloc+0x75/0x80 [ 460.012010][T15168] ? netlink_sendmsg+0x5ec/0xbe0 [ 460.016997][T15168] netlink_sendmsg+0x5ec/0xbe0 [ 460.021845][T15168] ? netlink_getsockopt+0x570/0x570 [ 460.027243][T15168] ? aa_sock_msg_perm+0x94/0x150 [ 460.032247][T15168] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 460.037625][T15168] ? security_socket_sendmsg+0x7c/0xa0 [ 460.043160][T15168] ? netlink_getsockopt+0x570/0x570 [ 460.048417][T15168] ____sys_sendmsg+0x5b7/0x8f0 [ 460.053266][T15168] ? __sys_sendmsg_sock+0x30/0x30 [ 460.058404][T15168] ? import_iovec+0x6f/0xa0 [ 460.062980][T15168] ___sys_sendmsg+0x236/0x2e0 [ 460.067755][T15168] ? __sys_sendmsg+0x2a0/0x2a0 [ 460.072622][T15168] ? trace_event_raw_event_lock+0x270/0x270 [ 460.078582][T15168] ? vfs_write+0x8b2/0xd60 [ 460.083144][T15168] __se_sys_sendmsg+0x1af/0x290 [ 460.088075][T15168] ? __x64_sys_sendmsg+0x80/0x80 [ 460.093079][T15168] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 460.099165][T15168] ? lockdep_hardirqs_on+0x94/0x140 [ 460.104435][T15168] do_syscall_64+0x4c/0xa0 [ 460.108898][T15168] ? clear_bhb_loop+0x30/0x80 [ 460.113625][T15168] ? clear_bhb_loop+0x30/0x80 [ 460.118399][T15168] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 460.124350][T15168] RIP: 0033:0x7f80bafe5cb9 [ 460.128821][T15168] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 460.148482][T15168] RSP: 002b:00007f80b9241028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 460.156974][T15168] RAX: ffffffffffffffda RBX: 00007f80bb260fa0 RCX: 00007f80bafe5cb9 [ 460.165029][T15168] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 460.173250][T15168] RBP: 00007f80b9241090 R08: 0000000000000000 R09: 0000000000000000 [ 460.181287][T15168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.189321][T15168] R13: 00007f80bb261038 R14: 00007f80bb260fa0 R15: 00007ffe142d0268 [ 460.197522][T15168] [ 460.355629][T15168] syz.0.3740: vmalloc error: size 65600, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 460.693549][T15168] CPU: 1 PID: 15168 Comm: syz.0.3740 Not tainted syzkaller #0 [ 460.701138][T15168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 460.711232][T15168] Call Trace: [ 460.714543][T15168] [ 460.717509][T15168] dump_stack_lvl+0x188/0x250 [ 460.722241][T15168] ? rcu_lock_release+0x5/0x20 [ 460.727042][T15168] ? show_regs_print_info+0x20/0x20 [ 460.732283][T15168] ? load_image+0x400/0x400 [ 460.736845][T15168] warn_alloc+0x243/0x320 [ 460.741225][T15168] ? zone_watermark_ok_safe+0x240/0x240 [ 460.746817][T15168] ? kmem_cache_alloc_node_trace+0x16c/0x300 [ 460.752852][T15168] ? __get_vm_area_node+0x119/0x2d0 [ 460.758153][T15168] __vmalloc_node_range+0x2b1/0x8b0 [ 460.763390][T15168] ? netlink_data_ready+0x10/0x10 [ 460.768466][T15168] ? netlink_sendmsg+0x5ec/0xbe0 [ 460.773435][T15168] vmalloc+0x75/0x80 [ 460.777369][T15168] ? netlink_sendmsg+0x5ec/0xbe0 [ 460.782341][T15168] netlink_sendmsg+0x5ec/0xbe0 [ 460.787154][T15168] ? netlink_getsockopt+0x570/0x570 [ 460.792386][T15168] ? aa_sock_msg_perm+0x94/0x150 [ 460.797359][T15168] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 460.802674][T15168] ? security_socket_sendmsg+0x7c/0xa0 [ 460.808174][T15168] ? netlink_getsockopt+0x570/0x570 [ 460.813403][T15168] ____sys_sendmsg+0x5b7/0x8f0 [ 460.818220][T15168] ? __sys_sendmsg_sock+0x30/0x30 [ 460.823283][T15168] ? import_iovec+0x6f/0xa0 [ 460.827829][T15168] ___sys_sendmsg+0x236/0x2e0 [ 460.832556][T15168] ? __sys_sendmsg+0x2a0/0x2a0 [ 460.837369][T15168] ? trace_event_raw_event_lock+0x270/0x270 [ 460.843298][T15168] ? vfs_write+0x8b2/0xd60 [ 460.847781][T15168] __se_sys_sendmsg+0x1af/0x290 [ 460.852667][T15168] ? __x64_sys_sendmsg+0x80/0x80 [ 460.857646][T15168] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 460.863788][T15168] ? lockdep_hardirqs_on+0x94/0x140 [ 460.869054][T15168] do_syscall_64+0x4c/0xa0 [ 460.873594][T15168] ? clear_bhb_loop+0x30/0x80 [ 460.874699][ C0] net_ratelimit: 10328 callbacks suppressed [ 460.874749][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 460.878302][T15168] ? clear_bhb_loop+0x30/0x80 [ 460.885680][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 460.896157][T15168] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 460.896186][T15168] RIP: 0033:0x7f80bafe5cb9 [ 460.896208][T15168] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 460.904990][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 460.912798][T15168] RSP: 002b:00007f80b9241028 EFLAGS: 00000246 [ 460.920604][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 460.923151][T15168] ORIG_RAX: 000000000000002e [ 460.944095][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 460.954768][T15168] RAX: ffffffffffffffda RBX: 00007f80bb260fa0 RCX: 00007f80bafe5cb9 [ 460.954792][T15168] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 460.954806][T15168] RBP: 00007f80b9241090 R08: 0000000000000000 R09: 0000000000000000 [ 460.954819][T15168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.954833][T15168] R13: 00007f80bb261038 R14: 00007f80bb260fa0 R15: 00007ffe142d0268 [ 460.954923][T15168] [ 460.962185][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.006684][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.017785][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 461.022903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.031610][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 461.162533][T15178] netlink: 'syz.3.3743': attribute type 10 has an invalid length. [ 461.244534][T15180] netlink: 'syz.3.3744': attribute type 1 has an invalid length. [ 461.262997][T15180] netlink: 191376 bytes leftover after parsing attributes in process `syz.3.3744'. [ 461.785171][T15168] Mem-Info: [ 461.788361][T15168] active_anon:269 inactive_anon:8042 isolated_anon:0 [ 461.788361][T15168] active_file:24566 inactive_file:36522 isolated_file:0 [ 461.788361][T15168] unevictable:768 dirty:168 writeback:0 [ 461.788361][T15168] slab_reclaimable:20892 slab_unreclaimable:111402 [ 461.788361][T15168] mapped:32211 shmem:4073 pagetables:637 bounce:0 [ 461.788361][T15168] kernel_misc_reclaimable:0 [ 461.788361][T15168] free:1354118 free_pcp:8970 free_cma:0 [ 461.914550][T15196] FAULT_INJECTION: forcing a failure. [ 461.914550][T15196] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 461.979326][T15196] CPU: 1 PID: 15196 Comm: syz.4.3748 Not tainted syzkaller #0 [ 461.986876][T15196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 461.996980][T15196] Call Trace: [ 462.000296][T15196] [ 462.003273][T15196] dump_stack_lvl+0x188/0x250 [ 462.008004][T15196] ? show_regs_print_info+0x20/0x20 [ 462.013262][T15196] ? load_image+0x400/0x400 [ 462.017826][T15196] ? __lock_acquire+0x7d10/0x7d10 [ 462.022919][T15196] should_fail+0x38c/0x4c0 [ 462.027396][T15196] _copy_from_iter+0x22e/0x1170 [ 462.032296][T15196] ? __lock_acquire+0x7d10/0x7d10 [ 462.037389][T15196] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 462.042965][T15196] ? __virt_addr_valid+0x3c6/0x470 [ 462.048175][T15196] ? __phys_addr_symbol+0x2b/0x70 [ 462.053246][T15196] ? __check_object_size+0x30c/0x410 [ 462.058594][T15196] netlink_sendmsg+0x758/0xbe0 [ 462.063414][T15196] ? netlink_getsockopt+0x570/0x570 [ 462.068660][T15196] ? aa_sock_msg_perm+0x94/0x150 [ 462.073676][T15196] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 462.079016][T15196] ? security_socket_sendmsg+0x7c/0xa0 [ 462.084550][T15196] ? netlink_getsockopt+0x570/0x570 [ 462.089790][T15196] ____sys_sendmsg+0x5b7/0x8f0 [ 462.094625][T15196] ? __sys_sendmsg_sock+0x30/0x30 [ 462.099717][T15196] ? import_iovec+0x6f/0xa0 [ 462.104266][T15196] ___sys_sendmsg+0x236/0x2e0 [ 462.108999][T15196] ? __sys_sendmsg+0x2a0/0x2a0 [ 462.113861][T15196] __se_sys_sendmsg+0x1af/0x290 [ 462.118754][T15196] ? __x64_sys_sendmsg+0x80/0x80 [ 462.123727][T15196] ? lockdep_hardirqs_on+0x94/0x140 [ 462.128988][T15196] do_syscall_64+0x4c/0xa0 [ 462.133437][T15196] ? clear_bhb_loop+0x30/0x80 [ 462.138201][T15196] ? clear_bhb_loop+0x30/0x80 [ 462.142923][T15196] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 462.148981][T15196] RIP: 0033:0x7f1ae429bcb9 [ 462.153435][T15196] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 462.173082][T15196] RSP: 002b:00007f1ae24f7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 462.181553][T15196] RAX: ffffffffffffffda RBX: 00007f1ae4516fa0 RCX: 00007f1ae429bcb9 [ 462.189574][T15196] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000004 [ 462.196684][T15168] Node 0 active_anon:1044kB inactive_anon:31760kB active_file:98064kB inactive_file:146088kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:128844kB dirty:668kB writeback:0kB shmem:14316kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:11952kB pagetables:2448kB all_unreclaimable? no [ 462.197591][T15196] RBP: 00007f1ae24f7090 R08: 0000000000000000 R09: 0000000000000000 [ 462.236864][T15196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.244883][T15196] R13: 00007f1ae4517038 R14: 00007f1ae4516fa0 R15: 00007ffc7f0105f8 [ 462.252920][T15196] [ 462.413592][T15168] Node 1 active_anon:32kB inactive_anon:508kB active_file:200kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:2076kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB all_unreclaimable? no [ 462.554561][T15202] netlink: 'syz.3.3750': attribute type 10 has an invalid length. [ 462.614530][T15168] Node 0 DMA free:15360kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 462.645712][T15202] netlink: 156 bytes leftover after parsing attributes in process `syz.3.3750'. [ 462.743321][T15203] netlink: 14 bytes leftover after parsing attributes in process `syz.3.3750'. [ 462.766836][T15168] lowmem_reserve[]: 0 2539 2540 2540 2540 [ 462.772695][T15168] Node 0 DMA32 free:1476696kB min:34784kB low:43480kB high:52176kB reserved_highatomic:0KB active_anon:1044kB inactive_anon:43260kB active_file:98064kB inactive_file:146088kB unevictable:1536kB writepending:668kB present:3129332kB managed:2606560kB mlocked:0kB bounce:0kB free_pcp:22828kB local_pcp:16964kB free_cma:0kB [ 462.861606][T15168] lowmem_reserve[]: 0 0 0 0 0 [ 462.929506][T15168] Node 0 Normal free:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:660kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 463.104056][T15168] lowmem_reserve[]: 0 0 0 0 0 [ 463.126792][T15168] Node 1 Normal free:3923912kB min:55108kB low:68884kB high:82660kB reserved_highatomic:0KB active_anon:32kB inactive_anon:508kB active_file:200kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4119672kB mlocked:0kB bounce:0kB free_pcp:1168kB local_pcp:0kB free_cma:0kB [ 463.403388][T15168] lowmem_reserve[]: 0 0 0 0 0 [ 463.408293][T15168] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 463.465406][T15203] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 463.553379][T15168] Node 0 DMA32: 1*4kB (U) 1297*8kB (ME) 1244*16kB (UME) 1331*32kB (UME) 690*64kB (UME) 286*128kB (UM) 151*256kB (UM) 62*512kB (UM) 22*1024kB (UME) 5*2048kB (ME) 295*4096kB (UM) = 1465132kB [ 463.680457][T15203] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 463.681333][T15168] Node 0 [ 463.709581][T15208] netlink: 207496 bytes leftover after parsing attributes in process `syz.4.3752'. [ 463.713615][T15168] Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 463.848594][T15168] Node 1 Normal: 210*4kB (UME) 48*8kB (UME) 24*16kB (UME) 186*32kB (UE) 75*64kB (UME) 19*128kB (UME) 12*256kB (UME) 3*512kB (UE) 1*1024kB (U) 2*2048kB (UM) 952*4096kB (M) = 3923912kB [ 463.878249][T15203] bond0 (unregistering): Released all slaves [ 463.970343][T15168] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 464.013130][T15168] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 464.067018][T15168] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 464.119244][T15168] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 464.283373][T15168] 75967 total pagecache pages [ 464.288575][T15168] 0 pages in swap cache [ 464.292762][T15168] Swap cache stats: add 0, delete 0, find 0/0 [ 464.383355][T15168] Free swap = 124996kB [ 464.387638][T15168] Total swap = 124996kB [ 464.391836][T15168] 2097051 pages RAM [ 464.421128][T15216] netlink: 'syz.4.3755': attribute type 10 has an invalid length. [ 464.454416][T15168] 0 pages HighMem/MovableOnly [ 464.459292][T15168] 411488 pages reserved [ 464.481307][T15168] 0 pages cma reserved [ 464.618088][T15218] netlink: 'syz.4.3756': attribute type 1 has an invalid length. [ 464.670882][T15218] netlink: 191376 bytes leftover after parsing attributes in process `syz.4.3756'. [ 465.346182][T15232] netlink: 'syz.1.3761': attribute type 21 has an invalid length. [ 465.363406][T15232] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3761'. [ 465.671156][T15237] netlink: 207496 bytes leftover after parsing attributes in process `syz.1.3763'. [ 465.883463][ C1] net_ratelimit: 7991 callbacks suppressed [ 465.883486][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.902205][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.909998][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 465.915232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.928041][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 465.939462][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.951207][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 465.963352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.975560][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 465.987946][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.201404][T15245] netlink: 'syz.1.3766': attribute type 10 has an invalid length. [ 466.765832][T15240] chnl_net:caif_netlink_parms(): no params data found [ 467.235821][T15266] netlink: 'syz.1.3770': attribute type 1 has an invalid length. [ 467.245900][T15240] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.323726][T15240] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.332229][T15240] device bridge_slave_0 entered promiscuous mode [ 467.406246][T15266] netlink: 191376 bytes leftover after parsing attributes in process `syz.1.3770'. [ 467.406197][T15240] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.473362][T15240] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.510618][T15240] device bridge_slave_1 entered promiscuous mode [ 467.660008][ T13] Bluetooth: hci1: command 0x0406 tx timeout [ 467.742540][T15240] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 467.846141][T15240] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 467.904440][ T13] Bluetooth: hci2: command 0x0409 tx timeout [ 468.019103][T15240] team0: Port device team_slave_0 added [ 468.055476][T15240] team0: Port device team_slave_1 added [ 468.248789][T15240] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 468.313706][T15240] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 468.413345][T15240] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 468.492239][T15240] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 468.548661][T15240] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 468.678984][T15240] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 469.191402][T15240] device hsr_slave_0 entered promiscuous mode [ 469.221830][T15240] device hsr_slave_1 entered promiscuous mode [ 469.341452][T15308] netlink: 'syz.4.3782': attribute type 33 has an invalid length. [ 469.393087][T15308] netlink: 164 bytes leftover after parsing attributes in process `syz.4.3782'. [ 469.738232][T15311] netlink: 'syz.0.3783': attribute type 1 has an invalid length. [ 469.882215][T15311] netlink: 191376 bytes leftover after parsing attributes in process `syz.0.3783'. [ 469.983543][ T4174] Bluetooth: hci2: command 0x041b tx timeout [ 470.006928][T15240] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 470.525215][T15331] netlink: 207496 bytes leftover after parsing attributes in process `syz.4.3789'. [ 470.893788][ C1] net_ratelimit: 7445 callbacks suppressed [ 470.893807][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.893888][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 470.900896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.914036][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 470.924840][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.936822][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 470.948678][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.961071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 470.972825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.988017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 471.077029][T15335] netlink: 'syz.4.3791': attribute type 10 has an invalid length. [ 471.366223][T15338] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3792'. [ 471.543453][T15349] FAULT_INJECTION: forcing a failure. [ 471.543453][T15349] name failslab, interval 1, probability 0, space 0, times 0 [ 471.646958][T15349] CPU: 0 PID: 15349 Comm: syz.3.3795 Not tainted syzkaller #0 [ 471.654509][T15349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 471.664613][T15349] Call Trace: [ 471.667931][T15349] [ 471.670891][T15349] dump_stack_lvl+0x188/0x250 [ 471.675614][T15349] ? show_regs_print_info+0x20/0x20 [ 471.680880][T15349] ? load_image+0x400/0x400 [ 471.685482][T15349] ? __might_sleep+0xf0/0xf0 [ 471.690107][T15349] ? __lock_acquire+0x7d10/0x7d10 [ 471.695180][T15349] should_fail+0x38c/0x4c0 [ 471.699648][T15349] should_failslab+0x5/0x20 [ 471.704195][T15349] slab_pre_alloc_hook+0x51/0xc0 [ 471.709171][T15349] ? __kernfs_new_node+0xe3/0x6c0 [ 471.714236][T15349] kmem_cache_alloc+0x3d/0x290 [ 471.719049][T15349] __kernfs_new_node+0xe3/0x6c0 [ 471.723956][T15349] ? kernfs_new_node+0x250/0x250 [ 471.728952][T15349] ? trace_event_raw_event_lock_acquire+0x2b0/0x2b0 [ 471.735693][T15349] ? make_kgid+0x1c4/0x660 [ 471.740400][T15349] ? from_kuid_munged+0x6b0/0x6b0 [ 471.745565][T15349] kernfs_new_node+0x148/0x250 [ 471.750381][T15349] kernfs_create_dir_ns+0x40/0x120 [ 471.755540][T15349] sysfs_create_dir_ns+0x12c/0x290 [ 471.760798][T15349] ? sysfs_warn_dup+0xa0/0xa0 [ 471.766379][T15349] ? __mutex_lock_common+0x465/0x2400 [ 471.771797][T15349] ? do_raw_spin_unlock+0x11d/0x230 [ 471.777049][T15349] kobject_add_internal+0x6e0/0xd90 [ 471.782317][T15349] kobject_add+0x160/0x230 [ 471.786776][T15349] ? __lock_acquire+0x7d10/0x7d10 [ 471.791947][T15349] ? kobject_init+0x1d0/0x1d0 [ 471.796774][T15349] ? do_raw_spin_unlock+0x11d/0x230 [ 471.802115][T15349] ? get_device_parent+0x288/0x3f0 [ 471.807417][T15349] device_add+0x483/0xfb0 [ 471.811908][T15349] netdev_register_kobject+0x184/0x320 [ 471.817437][T15349] register_netdevice+0x1039/0x16f0 [ 471.822833][T15349] ? netif_stacked_transfer_operstate+0x200/0x200 [ 471.829315][T15349] ? memset+0x1e/0x40 [ 471.833382][T15349] ip6_tnl_locate+0x733/0x840 [ 471.838206][T15349] ? ip6_tnl_unlink+0x2d0/0x2d0 [ 471.843645][T15349] ? ip6_tnl_siocdevprivate+0x5c8/0xb00 [ 471.849260][T15349] ip6_tnl_siocdevprivate+0x5ee/0xb00 [ 471.854690][T15349] ? ip6_tnl_start_xmit+0x12d0/0x12d0 [ 471.860126][T15349] ? full_name_hash+0x8e/0xe0 [ 471.864954][T15349] dev_ifsioc+0xa30/0xd50 [ 471.869366][T15349] ? dev_ioctl+0xe30/0xe30 [ 471.873914][T15349] ? full_name_hash+0x8e/0xe0 [ 471.878652][T15349] dev_ioctl+0x5df/0xe30 [ 471.883063][T15349] ? get_user_ifreq+0xc7/0x170 [ 471.887978][T15349] sock_ioctl+0x691/0x710 [ 471.892373][T15349] ? sock_poll+0x410/0x410 [ 471.896842][T15349] ? bpf_lsm_file_ioctl+0x5/0x10 [ 471.901823][T15349] ? security_file_ioctl+0x7c/0xa0 [ 471.906983][T15349] ? sock_poll+0x410/0x410 [ 471.911536][T15349] __se_sys_ioctl+0xfa/0x170 [ 471.916177][T15349] do_syscall_64+0x4c/0xa0 [ 471.920640][T15349] ? clear_bhb_loop+0x30/0x80 [ 471.925367][T15349] ? clear_bhb_loop+0x30/0x80 [ 471.930451][T15349] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 471.936404][T15349] RIP: 0033:0x7fea82dfecb9 [ 471.940898][T15349] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 471.961022][T15349] RSP: 002b:00007fea8105a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 471.969572][T15349] RAX: ffffffffffffffda RBX: 00007fea83079fa0 RCX: 00007fea82dfecb9 [ 471.977595][T15349] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 471.985609][T15349] RBP: 00007fea8105a090 R08: 0000000000000000 R09: 0000000000000000 [ 471.993737][T15349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 472.001869][T15349] R13: 00007fea8307a038 R14: 00007fea83079fa0 R15: 00007ffc52ee84b8 [ 472.009912][T15349] [ 472.056415][ T21] Bluetooth: hci2: command 0x040f tx timeout [ 472.444861][T15354] netlink: 'syz.0.3797': attribute type 1 has an invalid length. [ 472.464792][T15354] netlink: 191376 bytes leftover after parsing attributes in process `syz.0.3797'. [ 472.681338][T15358] FAULT_INJECTION: forcing a failure. [ 472.681338][T15358] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 472.748142][T15358] CPU: 0 PID: 15358 Comm: syz.0.3798 Not tainted syzkaller #0 [ 472.755715][T15358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 472.765852][T15358] Call Trace: [ 472.769206][T15358] [ 472.772207][T15358] dump_stack_lvl+0x188/0x250 [ 472.776985][T15358] ? show_regs_print_info+0x20/0x20 [ 472.782262][T15358] ? load_image+0x400/0x400 [ 472.786857][T15358] ? __lock_acquire+0x7d10/0x7d10 [ 472.791990][T15358] should_fail+0x38c/0x4c0 [ 472.796507][T15358] _copy_from_user+0x2e/0x170 [ 472.801260][T15358] __copy_msghdr_from_user+0xc9/0x630 [ 472.806795][T15358] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 472.812607][T15358] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 472.818037][T15358] ___sys_sendmsg+0x19a/0x2e0 [ 472.822822][T15358] ? __sys_sendmsg+0x2a0/0x2a0 [ 472.827715][T15358] ? trace_event_raw_event_lock+0x270/0x270 [ 472.833694][T15358] ? vfs_write+0x8b2/0xd60 [ 472.838298][T15358] __se_sys_sendmsg+0x1af/0x290 [ 472.843229][T15358] ? __x64_sys_sendmsg+0x80/0x80 [ 472.848227][T15358] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 472.854327][T15358] ? lockdep_hardirqs_on+0x94/0x140 [ 472.859606][T15358] do_syscall_64+0x4c/0xa0 [ 472.864084][T15358] ? clear_bhb_loop+0x30/0x80 [ 472.869019][T15358] ? clear_bhb_loop+0x30/0x80 [ 472.873874][T15358] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 472.879979][T15358] RIP: 0033:0x7f80bafe5cb9 [ 472.884736][T15358] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 472.904410][T15358] RSP: 002b:00007f80b9241028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 472.913079][T15358] RAX: ffffffffffffffda RBX: 00007f80bb260fa0 RCX: 00007f80bafe5cb9 [ 472.921126][T15358] RDX: 0000000024040080 RSI: 0000200000000480 RDI: 000000000000000a [ 472.929176][T15358] RBP: 00007f80b9241090 R08: 0000000000000000 R09: 0000000000000000 [ 472.937236][T15358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 472.945308][T15358] R13: 00007f80bb261038 R14: 00007f80bb260fa0 R15: 00007ffe142d0268 [ 472.953427][T15358] [ 473.292296][T15349] kobject_add_internal failed for ip6tnl1 (error: -12 parent: net) [ 473.385634][T15352] netlink: 'syz.4.3796': attribute type 10 has an invalid length. [ 473.458350][T15352] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 473.487214][T15352] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 473.614468][T15352] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 473.791416][T15370] netlink: 207496 bytes leftover after parsing attributes in process `syz.4.3801'. [ 473.838780][T15240] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 473.930195][T15372] netlink: 'syz.1.3803': attribute type 10 has an invalid length. [ 474.119593][T15374] netlink: 'syz.1.3804': attribute type 1 has an invalid length. [ 474.137169][ T4314] Bluetooth: hci2: command 0x0419 tx timeout [ 474.199180][T15374] netlink: 193500 bytes leftover after parsing attributes in process `syz.1.3804'. [ 474.456864][T15385] netlink: 'syz.1.3808': attribute type 1 has an invalid length. [ 474.523230][T15385] netlink: 191376 bytes leftover after parsing attributes in process `syz.1.3808'. [ 475.082824][T15393] netlink: 'syz.4.3811': attribute type 33 has an invalid length. [ 475.106504][T15393] netlink: 152 bytes leftover after parsing attributes in process `syz.4.3811'. [ 475.754610][T15406] netlink: 'syz.0.3814': attribute type 10 has an invalid length. [ 475.903544][ C1] net_ratelimit: 9561 callbacks suppressed [ 475.903565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.904023][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 475.910484][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.922409][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 475.934490][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.946833][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 475.958572][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.973721][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 475.982952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.995759][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 476.149645][T15411] netlink: 'syz.0.3816': attribute type 10 has an invalid length. [ 476.175994][T15411] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 476.252056][T15411] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 476.337915][T15411] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 476.527423][T15418] netlink: 'syz.0.3818': attribute type 1 has an invalid length. [ 476.545978][T15418] netlink: 193500 bytes leftover after parsing attributes in process `syz.0.3818'. [ 476.555857][T15416] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3819'. [ 476.842945][T15428] netlink: 15743 bytes leftover after parsing attributes in process `syz.3.3823'. [ 477.849135][T15443] netlink: 'syz.0.3826': attribute type 10 has an invalid length. [ 477.901151][ T4190] Bluetooth: hci5: command 0x0406 tx timeout [ 479.273026][T15240] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 479.396034][T15460] netlink: 'syz.0.3830': attribute type 1 has an invalid length. [ 479.403966][T15460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 479.508115][T15463] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.3831'. [ 479.978087][T15465] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3832'. [ 480.234252][T15476] netlink: 'syz.0.3837': attribute type 10 has an invalid length. [ 480.536272][T15488] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3841'. [ 480.556703][T15488] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3841'. [ 480.608568][T15490] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.3842'. [ 480.705721][T15493] netlink: 207496 bytes leftover after parsing attributes in process `syz.4.3843'. [ 480.936793][ C1] net_ratelimit: 10923 callbacks suppressed [ 480.936814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.955326][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.967722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.970934][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 480.980852][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.994155][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:34:ab:35:74:dc, vlan:0) [ 481.006930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.016695][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.028891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.040872][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.090482][T15240] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 481.134427][T15498] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 481.141821][T15498] IPv6: NLM_F_CREATE should be set when creating new route [ 481.149433][T15498] IPv6: NLM_F_CREATE should be set when creating new route [ 481.157020][T15498] IPv6: NLM_F_CREATE should be set when creating new route [ 481.257781][T15500] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3846'. [ 481.388685][T15504] netlink: 'syz.4.3848': attribute type 3 has an invalid length. [ 481.402521][T15502] FAULT_INJECTION: forcing a failure. [ 481.402521][T15502] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 481.439869][T15504] netlink: 13435 bytes leftover after parsing attributes in process `syz.4.3848'. [ 481.445954][T15509] netlink: 'syz.3.3849': attribute type 10 has an invalid length. [ 481.487808][T15502] CPU: 1 PID: 15502 Comm: syz.1.3847 Not tainted syzkaller #0 [ 481.495417][T15502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 481.505508][T15502] Call Trace: [ 481.508828][T15502] [ 481.511827][T15502] dump_stack_lvl+0x188/0x250 [ 481.516548][T15502] ? show_regs_print_info+0x20/0x20 [ 481.521788][T15502] ? load_image+0x400/0x400 [ 481.526765][T15502] ? __lock_acquire+0x7d10/0x7d10 [ 481.531830][T15502] ? __fget_files+0x40f/0x480 [ 481.536556][T15502] should_fail+0x38c/0x4c0 [ 481.541105][T15502] _copy_from_user+0x2e/0x170 [ 481.545820][T15502] bpf_obj_get_info_by_fd+0x448/0x2dc0 [ 481.551322][T15502] ? bpf_map_get_fd_by_id+0x310/0x310 [ 481.556743][T15502] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 481.563062][T15502] ? bpf_lsm_bpf+0x5/0x10 [ 481.567430][T15502] ? security_bpf+0x7a/0xa0 [ 481.572015][T15502] __sys_bpf+0x484/0x6f0 [ 481.576309][T15502] ? bpf_link_show_fdinfo+0x380/0x380 [ 481.581853][T15502] __x64_sys_bpf+0x78/0x90 [ 481.586364][T15502] do_syscall_64+0x4c/0xa0 [ 481.590837][T15502] ? clear_bhb_loop+0x30/0x80 [ 481.595645][T15502] ? clear_bhb_loop+0x30/0x80 [ 481.600369][T15502] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 481.606299][T15502] RIP: 0033:0x7f08c98d1cb9 [ 481.610758][T15502] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 481.630840][T15502] RSP: 002b:00007f08c7b2d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 481.639385][T15502] RAX: ffffffffffffffda RBX: 00007f08c9b4cfa0 RCX: 00007f08c98d1cb9 [ 481.647527][T15502] RDX: 0000000000000010 RSI: 0000200000000580 RDI: 000000000000000f [ 481.656330][T15502] RBP: 00007f08c7b2d090 R08: 0000000000000000 R09: 0000000000000000 [ 481.664428][T15502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 481.672797][T15502] R13: 00007f08c9b4d038 R14: 00007f08c9b4cfa0 R15: 00007ffd296521e8 [ 481.680839][T15502] [ 482.554305][T15521] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3854'. [ 482.572938][T15521] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3854'. [ 485.973589][ C1] net_ratelimit: 11294 callbacks suppressed [ 485.973610][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.992286][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.004652][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.017003][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.029357][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.041772][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.054172][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.071714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.084334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.096823][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.003327][ C1] net_ratelimit: 14072 callbacks suppressed [ 491.003350][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.030725][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.043222][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.055886][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.068812][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.081107][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.093518][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.105899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.118199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.130541][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.370035][ T4314] Bluetooth: hci3: command 0x0406 tx timeout [ 496.053460][ C1] net_ratelimit: 13918 callbacks suppressed [ 496.053482][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.074049][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.086873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.099281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.111596][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.123897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.136193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.148594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.160925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.173205][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 500.797810][T15527] chnl_net:caif_netlink_parms(): no params data found [ 501.083510][ C1] net_ratelimit: 9439 callbacks suppressed [ 501.083531][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.102041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.114428][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.126906][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.139184][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.151687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.164097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.176453][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.188787][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.201099][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.251348][T15531] chnl_net:caif_netlink_parms(): no params data found [ 501.369152][ T4314] Bluetooth: hci4: command 0x0409 tx timeout [ 501.375475][ T4314] Bluetooth: hci6: command 0x0409 tx timeout [ 501.473751][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.480101][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 501.757288][T15536] chnl_net:caif_netlink_parms(): no params data found [ 501.791471][T15535] chnl_net:caif_netlink_parms(): no params data found [ 502.382164][ T4314] Bluetooth: hci8: command 0x0409 tx timeout [ 502.479792][ T4314] Bluetooth: hci7: command 0x0409 tx timeout [ 502.987600][T15527] bridge0: port 1(bridge_slave_0) entered blocking state [ 502.995006][T15527] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.023499][T15527] device bridge_slave_0 entered promiscuous mode [ 503.058825][T15531] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.066859][T15531] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.075738][T15531] device bridge_slave_0 entered promiscuous mode [ 503.291756][T15527] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.299180][T15527] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.331719][T15527] device bridge_slave_1 entered promiscuous mode [ 503.402272][T15531] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.424447][T15531] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.436199][T15531] device bridge_slave_1 entered promiscuous mode [ 503.513453][ T4258] Bluetooth: hci6: command 0x041b tx timeout [ 503.523576][ T4258] Bluetooth: hci4: command 0x041b tx timeout [ 503.801581][T15536] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.841043][T15536] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.860187][T15536] device bridge_slave_0 entered promiscuous mode [ 503.923587][T15536] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.933842][T15536] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.013491][T15536] device bridge_slave_1 entered promiscuous mode [ 504.060742][T15527] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 504.074299][T15531] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 504.113447][T15535] bridge0: port 1(bridge_slave_0) entered blocking state [ 504.120558][T15535] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.146655][T15535] device bridge_slave_0 entered promiscuous mode [ 504.286756][T15527] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 504.300919][T15531] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 504.328212][T15535] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.335615][T15535] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.367604][T15535] device bridge_slave_1 entered promiscuous mode [ 504.447291][T15536] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 504.495632][ T4314] Bluetooth: hci8: command 0x041b tx timeout [ 504.520581][T15531] team0: Port device team_slave_0 added [ 504.529127][T15536] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 504.602443][ T4314] Bluetooth: hci7: command 0x041b tx timeout [ 505.573323][ T4314] Bluetooth: hci4: command 0x040f tx timeout [ 505.590083][ T4314] Bluetooth: hci6: command 0x040f tx timeout [ 506.103501][ C1] net_ratelimit: 9974 callbacks suppressed [ 506.103523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.121954][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.134433][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.146757][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.159094][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.171434][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.183787][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.196177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.208454][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.223863][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.538424][ T4314] Bluetooth: hci8: command 0x040f tx timeout [ 506.694386][ T4314] Bluetooth: hci7: command 0x040f tx timeout [ 507.686781][ T4258] Bluetooth: hci6: command 0x0419 tx timeout [ 507.709929][ T4258] Bluetooth: hci4: command 0x0419 tx timeout [ 508.635166][ T4314] Bluetooth: hci8: command 0x0419 tx timeout [ 508.785423][ T4314] Bluetooth: hci7: command 0x0419 tx timeout [ 511.123389][ C1] net_ratelimit: 11902 callbacks suppressed [ 511.123411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.142141][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.154740][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.167107][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.179828][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.192466][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.204931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.217899][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.230284][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.242913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.153331][ C1] net_ratelimit: 12195 callbacks suppressed [ 516.153352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.171808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.184204][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.196620][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.208971][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.221411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.233720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.246030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.258362][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.270731][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.173469][ C1] net_ratelimit: 12053 callbacks suppressed [ 521.173491][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.191861][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.204252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.216897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.229532][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.242093][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.254678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.267329][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.279681][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.292112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.203324][ C1] net_ratelimit: 11441 callbacks suppressed [ 526.203346][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.221976][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.234368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.246696][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.259080][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.271527][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.283937][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.296327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.308696][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.320988][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.803312][ T4314] Bluetooth: hci9: command 0x0409 tx timeout [ 530.893321][ T4258] Bluetooth: hci9: command 0x041b tx timeout [ 531.223323][ C1] net_ratelimit: 11746 callbacks suppressed [ 531.223345][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.241620][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.254032][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.266395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.278806][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.291272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.303606][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.315880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.335498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.348022][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.957630][ T4258] Bluetooth: hci9: command 0x040f tx timeout [ 535.006783][ T4258] Bluetooth: hci9: command 0x0419 tx timeout [ 536.243364][ C1] net_ratelimit: 11967 callbacks suppressed [ 536.243387][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.261795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.274166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.286538][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.299390][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.311753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.324434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.336802][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.349150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.361532][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.273333][ C1] net_ratelimit: 12286 callbacks suppressed [ 541.273356][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.291828][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.304310][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.316611][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.328931][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.341414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.354065][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.366580][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.379317][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.391728][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.303535][ C1] net_ratelimit: 12146 callbacks suppressed [ 546.303557][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.321982][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.334380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.346727][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.359123][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.371628][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.384028][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.396493][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.408892][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.421214][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.323308][ C1] net_ratelimit: 12159 callbacks suppressed [ 551.323330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.342244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.354562][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.366881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.379238][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.391539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.403900][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.416274][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.428620][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.441037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.343495][ C1] net_ratelimit: 11981 callbacks suppressed [ 556.343517][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.362115][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.374645][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.387214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.400316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.412870][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.426183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.438608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.451196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.463647][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.276501][ T4314] Bluetooth: hci10: command 0x0409 tx timeout [ 561.363362][ C1] net_ratelimit: 9791 callbacks suppressed [ 561.363384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.381866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.394211][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.406663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.419263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.431896][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.444452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.456827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.469256][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.481565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.653317][ T4314] Bluetooth: hci11: command 0x0409 tx timeout [ 562.863372][ T4314] Bluetooth: hci12: command 0x0409 tx timeout [ 562.883708][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.890151][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 563.113294][ T4314] Bluetooth: hci13: command 0x0409 tx timeout [ 563.400358][ T4314] Bluetooth: hci10: command 0x041b tx timeout [ 563.752850][ T4314] Bluetooth: hci11: command 0x041b tx timeout [ 564.963299][ T4258] Bluetooth: hci12: command 0x041b tx timeout [ 565.213303][ T4258] Bluetooth: hci13: command 0x041b tx timeout [ 565.513157][ T4258] Bluetooth: hci10: command 0x040f tx timeout [ 565.847060][ T4258] Bluetooth: hci11: command 0x040f tx timeout [ 566.393833][ C1] net_ratelimit: 11915 callbacks suppressed [ 566.393855][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.412210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.424522][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.436869][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.449213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.461593][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.473999][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.486360][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.498706][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.511082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.043290][ T4258] Bluetooth: hci12: command 0x040f tx timeout [ 567.280102][ T4258] Bluetooth: hci13: command 0x040f tx timeout [ 567.581254][ T4258] Bluetooth: hci10: command 0x0419 tx timeout [ 567.923010][ T4258] Bluetooth: hci11: command 0x0419 tx timeout [ 569.133321][ T4258] Bluetooth: hci12: command 0x0419 tx timeout [ 569.333311][ T4258] Bluetooth: hci13: command 0x0419 tx timeout [ 571.413552][ C1] net_ratelimit: 12110 callbacks suppressed [ 571.413577][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.432005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.444664][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.457097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.469524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.481903][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.494203][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.506622][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.519068][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.531434][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.443310][ C1] net_ratelimit: 12123 callbacks suppressed [ 576.443332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.462871][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.475383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.487804][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.500181][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.512933][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.525334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.537703][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.624750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.637242][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.463406][ C1] net_ratelimit: 12074 callbacks suppressed [ 581.463437][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.482347][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.494715][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.507319][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.519835][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.532226][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.544966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.557630][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.570076][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.582493][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.503628][ C1] net_ratelimit: 11341 callbacks suppressed [ 586.503650][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.522202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.534602][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.547142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.559766][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.572116][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.584603][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.597009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.609573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.622025][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.323261][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 587.330276][ C1] rcu: 0-...!: (1 ticks this GP) idle=f21/1/0x4000000000000002 softirq=42164/42164 fqs=0 [ 587.341564][ C1] (detected by 1, t=10502 jiffies, g=59781, q=1838) [ 587.348379][ C1] Sending NMI from CPU 1 to CPUs 0: [ 587.353621][ C0] NMI backtrace for cpu 0 [ 587.353647][ C0] CPU: 0 PID: 15519 Comm: syz-executor Not tainted syzkaller #0 [ 587.353664][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 587.353675][ C0] RIP: 0010:lock_release+0x5b5/0x8a0 [ 587.353707][ C0] Code: 44 2c 04 f8 75 6f 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 60 0e 36 e0 45 4b c7 04 2c 00 00 00 00 43 c7 44 2c 08 00 00 00 00 <65> 48 8b 04 25 28 00 00 00 48 3b 84 24 c0 00 00 00 0f 85 8a 00 00 [ 587.353721][ C0] RSP: 0018:ffffc90000007100 EFLAGS: 00000046 [ 587.353736][ C0] RAX: 0000000000000001 RBX: 317fc64f4fe2bad8 RCX: 345f8bdd8648ec00 [ 587.353748][ C0] RDX: 0000000000000005 RSI: ffffffff8a2b3a20 RDI: ffffffff8a79f780 [ 587.353760][ C0] RBP: ffffc90000007210 R08: ffffffff8d89d8af R09: 1ffffffff1b13b15 [ 587.353774][ C0] R10: dffffc0000000000 R11: fffffbfff1b13b16 R12: 1ffff92000000e2c [ 587.353787][ C0] R13: dffffc0000000000 R14: ffff88802ab928a0 R15: 0000000000000046 [ 587.353799][ C0] FS: 000055557b7d8500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 [ 587.353815][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 587.353826][ C0] CR2: 00007f80bb0a51ec CR3: 000000001cc4b000 CR4: 00000000003506f0 [ 587.353842][ C0] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 587.353853][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 587.353863][ C0] Call Trace: [ 587.353870][ C0] [ 587.353882][ C0] ? rcu_lock_release+0x5/0x40 [ 587.353911][ C0] ? __lock_acquire+0x7d10/0x7d10 [ 587.353941][ C0] ? llist_add_batch+0x85/0xa0 [ 587.353970][ C0] perf_output_begin_forward+0x79b/0xa40 [ 587.353986][ C0] ? kvm_is_in_guest+0x24/0x30 [ 587.354014][ C0] ? __perf_cgroup_move+0x140/0x140 [ 587.354037][ C0] perf_event_output_forward+0x19b/0x2e0 [ 587.354057][ C0] ? perf_get_page_size+0x430/0x430 [ 587.354082][ C0] ? __perf_event_account_interrupt+0x187/0x280 [ 587.354101][ C0] __perf_event_overflow+0x364/0x530 [ 587.354123][ C0] perf_swevent_event+0x4ad/0x530 [ 587.354143][ C0] perf_tp_event+0x383/0xbf0 [ 587.354158][ C0] ? __perf_event_overflow+0x415/0x530 [ 587.354178][ C0] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 587.354195][ C0] ? perf_swevent_event+0x50e/0x530 [ 587.354241][ C0] perf_trace_run_bpf_submit+0xf3/0x1c0 [ 587.354262][ C0] perf_trace_preemptirq_template+0x2aa/0x360 [ 587.354282][ C0] ? asm_sysvec_irq_work+0x16/0x20 [ 587.354301][ C0] ? trace_event_raw_event_preemptirq_template+0x290/0x290 [ 587.354322][ C0] ? __irq_exit_rcu+0x147/0x230 [ 587.354338][ C0] ? irq_exit_rcu+0x20/0x20 [ 587.354356][ C0] ? asm_sysvec_irq_work+0x16/0x20 [ 587.354373][ C0] trace_irq_enable_rcuidle+0x108/0x180 [ 587.354393][ C0] trace_hardirqs_on+0x57/0x80 [ 587.354409][ C0] asm_sysvec_irq_work+0x16/0x20 [ 587.354426][ C0] RIP: 0010:rcu_read_unlock_special+0x7f/0x4a0 [ 587.354444][ C0] Code: eb 03 48 b8 f1 f1 f1 f1 f8 f2 f2 f2 4a 89 04 2b 42 c7 44 2b 08 f8 f3 f3 f3 65 44 8b 35 c2 ef 9c 7e 41 f7 c6 00 00 f0 00 74 40 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 2b 00 00 00 00 42 c7 44 2b 08 [ 587.354458][ C0] RSP: 0018:ffffc90000007a00 EFLAGS: 00000206 [ 587.354471][ C0] RAX: 345f8bdd8648ec00 RBX: 1ffff92000000f44 RCX: 345f8bdd8648ec00 [ 587.354484][ C0] RDX: dffffc0000000000 RSI: ffffffff8a2b2780 RDI: ffffffff8a79f780 [ 587.354497][ C0] RBP: ffffc90000007ae0 R08: ffffffff901d1177 R09: 1ffffffff203a22e [ 587.354509][ C0] R10: dffffc0000000000 R11: fffffbfff203a22f R12: ffffffff8c322f00 [ 587.354522][ C0] R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001 [ 587.354546][ C0] ? __rcu_read_unlock+0xd0/0xd0 [ 587.354563][ C0] ? read_lock_is_recursive+0x10/0x10 [ 587.354582][ C0] ? __lock_acquire+0x7d10/0x7d10 [ 587.354606][ C0] __rcu_read_unlock+0x78/0xd0 [ 587.354623][ C0] process_backlog+0x3ef/0x790 [ 587.354652][ C0] ? rps_trigger_softirq+0x210/0x210 [ 587.354671][ C0] ? virtqueue_poll+0x169/0x210 [ 587.354696][ C0] __napi_poll+0xc0/0x430 [ 587.354720][ C0] ? net_rx_action+0x307/0xa10 [ 587.354741][ C0] net_rx_action+0x4d4/0xa10 [ 587.354764][ C0] ? net_tx_action+0x880/0x880 [ 587.354782][ C0] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 587.354801][ C0] ? detach_timer+0x2b0/0x2b0 [ 587.354829][ C0] handle_softirqs+0x339/0x830 [ 587.354848][ C0] ? __irq_exit_rcu+0x13b/0x230 [ 587.354866][ C0] ? do_softirq+0x210/0x210 [ 587.354888][ C0] __irq_exit_rcu+0x13b/0x230 [ 587.354904][ C0] ? irq_exit_rcu+0x20/0x20 [ 587.354926][ C0] irq_exit_rcu+0x5/0x20 [ 587.354940][ C0] sysvec_apic_timer_interrupt+0xa0/0xc0 [ 587.354962][ C0] [ 587.354968][ C0] [ 587.354974][ C0] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 587.354991][ C0] RIP: 0010:kasan_check_range+0x40/0x290 [ 587.355011][ C0] Code: 49 01 f0 0f 82 0e 02 00 00 49 89 f8 49 c1 e8 2f 41 81 f8 ff ff 01 00 0f 82 fa 01 00 00 49 bc 01 00 00 00 00 fc ff df 49 89 fe <49> c1 ee 03 49 ba 00 00 00 00 00 fc ff df 4f 8d 1c 16 4c 8d 44 3e [ 587.355025][ C0] RSP: 0018:ffffc90002ecfa40 EFLAGS: 00000246 [ 587.355038][ C0] RAX: ffffffff83a39401 RBX: dffffc0000000000 RCX: ffffffff83a39450 [ 587.355051][ C0] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8880242645b8 [ 587.355062][ C0] RBP: ffff888024264501 R08: 000000000001ffff R09: 1ffff1100484c8b7 [ 587.355075][ C0] R10: dffffc0000000000 R11: ffffed100484c8b8 R12: dffffc0000000001 [ 587.355088][ C0] R13: 0000000000000e00 R14: ffff8880242645b8 R15: ffff8880242645b0 [ 587.355104][ C0] ? tomoyo_check_acl+0x291/0x3f0 [ 587.355123][ C0] ? tomoyo_check_acl+0x2e0/0x3f0 [ 587.355147][ C0] tomoyo_check_acl+0x2e0/0x3f0 [ 587.355166][ C0] ? tomoyo_execute_permission+0x410/0x410 [ 587.355188][ C0] tomoyo_path_permission+0x1b4/0x380 [ 587.355210][ C0] tomoyo_path_perm+0x3b0/0x5d0 [ 587.355231][ C0] ? tomoyo_path_permission+0x380/0x380 [ 587.355266][ C0] ? __d_add+0x4e0/0x7f0 [ 587.355284][ C0] ? d_set_d_op+0x25b/0x370 [ 587.355302][ C0] ? simple_lookup+0xc1/0xf0 [ 587.355319][ C0] ? lookup_one_qstr_excl+0x11c/0x240 [ 587.355339][ C0] tomoyo_path_symlink+0xa8/0xf0 [ 587.355355][ C0] ? tomoyo_path_rmdir+0xf0/0xf0 [ 587.355373][ C0] ? kern_path_create+0x190/0x190 [ 587.355394][ C0] security_path_symlink+0xdc/0x130 [ 587.355416][ C0] do_symlinkat+0x105/0x6b0 [ 587.355435][ C0] ? vfs_symlink+0x3d0/0x3d0 [ 587.355454][ C0] ? getname_flags+0x1fe/0x500 [ 587.355473][ C0] __x64_sys_symlinkat+0x95/0xa0 [ 587.355492][ C0] do_syscall_64+0x4c/0xa0 [ 587.355508][ C0] ? clear_bhb_loop+0x30/0x80 [ 587.355522][ C0] ? clear_bhb_loop+0x30/0x80 [ 587.355540][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 587.355557][ C0] RIP: 0033:0x7f80bafe4d77 [ 587.355575][ C0] Code: 44 00 00 48 89 f2 31 c9 48 89 fe bf 9c ff ff ff e9 fe f5 ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 b8 0a 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 587.355589][ C0] RSP: 002b:00007ffe142d05c8 EFLAGS: 00000202 ORIG_RAX: 000000000000010a [ 587.355605][ C0] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f80bafe4d77 [ 587.355617][ C0] RDX: 00007f80bb055c3a RSI: 00000000ffffff9c RDI: 00007ffe142d0660 [ 587.355629][ C0] RBP: 00007ffe142d060c R08: 0000000000000001 R09: 00000000ffffffff [ 587.355640][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000218 [ 587.355650][ C0] R13: 00000000000927c0 R14: 0000000000075a58 R15: 00007ffe142d0660 [ 587.355671][ C0] [ 587.356624][ C1] rcu: rcu_preempt kthread timer wakeup didn't happen for 10501 jiffies! g59781 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 588.083566][ C1] rcu: Possible timer handling issue on cpu=0 timer-softirq=35052 [ 588.091503][ C1] rcu: rcu_preempt kthread starved for 10502 jiffies! g59781 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 [ 588.102917][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 588.112904][ C1] rcu: RCU grace-period kthread stack dump: [ 588.118806][ C1] task:rcu_preempt state:I stack:27088 pid: 15 ppid: 2 flags:0x00004000 [ 588.128045][ C1] Call Trace: [ 588.131348][ C1] [ 588.134309][ C1] __schedule+0x11ef/0x43c0 [ 588.138856][ C1] ? _raw_spin_unlock_irqrestore+0x82/0x120 [ 588.144785][ C1] ? lockdep_hardirqs_on+0x94/0x140 [ 588.150012][ C1] ? _raw_spin_unlock_irqrestore+0xc1/0x120 [ 588.155936][ C1] ? _raw_spin_unlock+0x40/0x40 [ 588.160815][ C1] ? rcu_is_watching+0x11/0xa0 [ 588.165603][ C1] ? release_firmware_map_entry+0x190/0x190 [ 588.171550][ C1] schedule+0x11b/0x1e0 [ 588.175737][ C1] schedule_timeout+0x184/0x2d0 [ 588.180617][ C1] ? console_conditional_schedule+0x40/0x40 [ 588.186545][ C1] ? update_process_times+0x200/0x200 [ 588.191950][ C1] ? prepare_to_swait_event+0x331/0x350 [ 588.197531][ C1] rcu_gp_fqs_loop+0x2be/0x11d0 [ 588.202412][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 588.207649][ C1] ? lockdep_hardirqs_on+0x94/0x140 [ 588.212888][ C1] ? rcu_gp_init+0xd6c/0x10f0 [ 588.217598][ C1] ? rcu_gp_init+0x10f0/0x10f0 [ 588.222416][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 588.227740][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 588.233059][ C1] ? lockdep_hardirqs_on+0x94/0x140 [ 588.238318][ C1] rcu_gp_kthread+0x9b/0x370 [ 588.242941][ C1] ? _raw_spin_unlock_irqrestore+0xc1/0x120 [ 588.248871][ C1] ? rcu_report_qs_rsp+0x1a0/0x1a0 [ 588.254012][ C1] ? _raw_spin_unlock_irqrestore+0xc1/0x120 [ 588.259939][ C1] ? __kthread_parkme+0x157/0x1b0 [ 588.264997][ C1] kthread+0x436/0x520 [ 588.269092][ C1] ? rcu_report_qs_rsp+0x1a0/0x1a0 [ 588.274226][ C1] ? kthread_blkcg+0xd0/0xd0 [ 588.278851][ C1] ret_from_fork+0x1f/0x30 [ 588.283344][ C1] [ 588.286394][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 588.292741][ C1] Sending NMI from CPU 1 to CPUs 0: [ 588.297984][ C0] NMI backtrace for cpu 0 [ 588.297996][ C0] CPU: 0 PID: 15519 Comm: syz-executor Not tainted syzkaller #0 [ 588.298013][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 588.298023][ C0] RIP: 0010:kasan_check_range+0x7d/0x290 [ 588.298047][ C0] Code: 8d 44 3e ff 4d 89 c1 49 c1 e9 03 4b 8d 1c 21 49 89 df 4d 29 df 49 83 ff 10 7f 29 4d 85 ff 0f 84 38 01 00 00 4c 89 cb 48 f7 d3 <4c> 01 f3 41 80 3b 00 0f 85 86 01 00 00 49 ff c3 48 ff c3 75 ee e9 [ 588.298063][ C0] RSP: 0018:ffffc900000074b8 EFLAGS: 00000002 [ 588.298078][ C0] RAX: 0000000000000001 RBX: e0000eeff4633f01 RCX: ffffffff81988e8e [ 588.298091][ C0] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88805ce607f0 [ 588.298102][ C0] RBP: 0000000000000005 R08: ffff88805ce607f7 R09: 1ffff1100b9cc0fe [ 588.298114][ C0] R10: dffffc0000000000 R11: ffffed100b9cc0fe R12: dffffc0000000001 [ 588.298128][ C0] R13: 0000000000000005 R14: 1ffff1100b9cc0fe R15: 0000000000000001 [ 588.298139][ C0] FS: 000055557b7d8500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 [ 588.298155][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 588.298166][ C0] CR2: 00007f80bb0a51ec CR3: 000000001cc4b000 CR4: 00000000003506f0 [ 588.298181][ C0] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 588.298192][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 588.298202][ C0] Call Trace: [ 588.298209][ C0] [ 588.298219][ C0] perf_swevent_event+0x40e/0x530 [ 588.298242][ C0] perf_tp_event+0x383/0xbf0 [ 588.298262][ C0] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 588.298280][ C0] ? _raw_spin_unlock+0x40/0x40 [ 588.298314][ C0] ? _raw_spin_unlock+0x40/0x40 [ 588.298332][ C0] ? __wake_up_common+0x2a4/0x4e0 [ 588.298363][ C0] perf_trace_run_bpf_submit+0xf3/0x1c0 [ 588.298384][ C0] perf_trace_preemptirq_template+0x2aa/0x360 [ 588.298405][ C0] ? asm_sysvec_irq_work+0x16/0x20 [ 588.298422][ C0] ? trace_event_raw_event_preemptirq_template+0x290/0x290 [ 588.298443][ C0] ? __irq_exit_rcu+0x147/0x230 [ 588.298459][ C0] ? irq_exit_rcu+0x20/0x20 [ 588.298477][ C0] ? asm_sysvec_irq_work+0x16/0x20 [ 588.298493][ C0] trace_irq_enable_rcuidle+0x108/0x180 [ 588.298512][ C0] trace_hardirqs_on+0x57/0x80 [ 588.298529][ C0] asm_sysvec_irq_work+0x16/0x20 [ 588.298545][ C0] RIP: 0010:rcu_read_unlock_special+0x7f/0x4a0 [ 588.298564][ C0] Code: eb 03 48 b8 f1 f1 f1 f1 f8 f2 f2 f2 4a 89 04 2b 42 c7 44 2b 08 f8 f3 f3 f3 65 44 8b 35 c2 ef 9c 7e 41 f7 c6 00 00 f0 00 74 40 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 2b 00 00 00 00 42 c7 44 2b 08 [ 588.298577][ C0] RSP: 0018:ffffc90000007a00 EFLAGS: 00000206 [ 588.298590][ C0] RAX: 345f8bdd8648ec00 RBX: 1ffff92000000f44 RCX: 345f8bdd8648ec00 [ 588.298603][ C0] RDX: dffffc0000000000 RSI: ffffffff8a2b2780 RDI: ffffffff8a79f780 [ 588.298615][ C0] RBP: ffffc90000007ae0 R08: ffffffff901d1177 R09: 1ffffffff203a22e [ 588.298629][ C0] R10: dffffc0000000000 R11: fffffbfff203a22f R12: ffffffff8c322f00 [ 588.298642][ C0] R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001 [ 588.298665][ C0] ? __rcu_read_unlock+0xd0/0xd0 [ 588.298682][ C0] ? read_lock_is_recursive+0x10/0x10 [ 588.298703][ C0] ? __lock_acquire+0x7d10/0x7d10 [ 588.298727][ C0] __rcu_read_unlock+0x78/0xd0 [ 588.298745][ C0] process_backlog+0x3ef/0x790 [ 588.298775][ C0] ? rps_trigger_softirq+0x210/0x210 [ 588.298794][ C0] ? virtqueue_poll+0x169/0x210 [ 588.298820][ C0] __napi_poll+0xc0/0x430 [ 588.298837][ C0] ? net_rx_action+0x307/0xa10 [ 588.298858][ C0] net_rx_action+0x4d4/0xa10 [ 588.298887][ C0] ? net_tx_action+0x880/0x880 [ 588.298904][ C0] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 588.298924][ C0] ? detach_timer+0x2b0/0x2b0 [ 588.298953][ C0] handle_softirqs+0x339/0x830 [ 588.298972][ C0] ? __irq_exit_rcu+0x13b/0x230 [ 588.298990][ C0] ? do_softirq+0x210/0x210 [ 588.299012][ C0] __irq_exit_rcu+0x13b/0x230 [ 588.299028][ C0] ? irq_exit_rcu+0x20/0x20 [ 588.299049][ C0] irq_exit_rcu+0x5/0x20 [ 588.299064][ C0] sysvec_apic_timer_interrupt+0xa0/0xc0 [ 588.299085][ C0] [ 588.299089][ C0] [ 588.299095][ C0] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 588.299112][ C0] RIP: 0010:kasan_check_range+0x40/0x290 [ 588.299130][ C0] Code: 49 01 f0 0f 82 0e 02 00 00 49 89 f8 49 c1 e8 2f 41 81 f8 ff ff 01 00 0f 82 fa 01 00 00 49 bc 01 00 00 00 00 fc ff df 49 89 fe <49> c1 ee 03 49 ba 00 00 00 00 00 fc ff df 4f 8d 1c 16 4c 8d 44 3e [ 588.299144][ C0] RSP: 0018:ffffc90002ecfa40 EFLAGS: 00000246 [ 588.299156][ C0] RAX: ffffffff83a39401 RBX: dffffc0000000000 RCX: ffffffff83a39450 [ 588.299173][ C0] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8880242645b8 [ 588.299184][ C0] RBP: ffff888024264501 R08: 000000000001ffff R09: 1ffff1100484c8b7 [ 588.299196][ C0] R10: dffffc0000000000 R11: ffffed100484c8b8 R12: dffffc0000000001 [ 588.299209][ C0] R13: 0000000000000e00 R14: ffff8880242645b8 R15: ffff8880242645b0 [ 588.299225][ C0] ? tomoyo_check_acl+0x291/0x3f0 [ 588.299244][ C0] ? tomoyo_check_acl+0x2e0/0x3f0 [ 588.299267][ C0] tomoyo_check_acl+0x2e0/0x3f0 [ 588.299286][ C0] ? tomoyo_execute_permission+0x410/0x410 [ 588.299307][ C0] tomoyo_path_permission+0x1b4/0x380 [ 588.299329][ C0] tomoyo_path_perm+0x3b0/0x5d0 [ 588.299349][ C0] ? tomoyo_path_permission+0x380/0x380 [ 588.299384][ C0] ? __d_add+0x4e0/0x7f0 [ 588.299402][ C0] ? d_set_d_op+0x25b/0x370 [ 588.299419][ C0] ? simple_lookup+0xc1/0xf0 [ 588.299436][ C0] ? lookup_one_qstr_excl+0x11c/0x240 [ 588.299456][ C0] tomoyo_path_symlink+0xa8/0xf0 [ 588.299471][ C0] ? tomoyo_path_rmdir+0xf0/0xf0 [ 588.299489][ C0] ? kern_path_create+0x190/0x190 [ 588.299509][ C0] security_path_symlink+0xdc/0x130 [ 588.299531][ C0] do_symlinkat+0x105/0x6b0 [ 588.299549][ C0] ? vfs_symlink+0x3d0/0x3d0 [ 588.299568][ C0] ? getname_flags+0x1fe/0x500 [ 588.299586][ C0] __x64_sys_symlinkat+0x95/0xa0 [ 588.299605][ C0] do_syscall_64+0x4c/0xa0 [ 588.299619][ C0] ? clear_bhb_loop+0x30/0x80 [ 588.299635][ C0] ? clear_bhb_loop+0x30/0x80 [ 588.299652][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 588.299668][ C0] RIP: 0033:0x7f80bafe4d77 [ 588.299685][ C0] Code: 44 00 00 48 89 f2 31 c9 48 89 fe bf 9c ff ff ff e9 fe f5 ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 b8 0a 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 588.299699][ C0] RSP: 002b:00007ffe142d05c8 EFLAGS: 00000202 ORIG_RAX: 000000000000010a [ 588.299715][ C0] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f80bafe4d77 [ 588.299726][ C0] RDX: 00007f80bb055c3a RSI: 00000000ffffff9c RDI: 00007ffe142d0660 [ 588.299738][ C0] RBP: 00007ffe142d060c R08: 0000000000000001 R09: 00000000ffffffff [ 588.299750][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000218 [ 588.299759][ C0] R13: 00000000000927c0 R14: 0000000000075a58 R15: 00007ffe142d0660 [ 588.299780][ C0] [ 588.566159][ T21] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-... } 10664 jiffies s: 24741 root: 0x1/. [ 588.993570][ T21] rcu: blocking rcu_node structures (internal RCU debug): [ 589.000877][ T21] Task dump for CPU 0: [ 589.005030][ T21] task:syz-executor state:R running task stack:26928 pid:15519 ppid: 7459 flags:0x0000000c [ 589.015935][ T21] Call Trace: [ 589.019246][ T21] [ 589.022211][ T21] ? perf_swevent_event+0x33e/0x530 [ 589.027496][ T21] ? rcu_lock_release+0x5/0x20 [ 589.032311][ T21] ? __lock_acquire+0x7d10/0x7d10 [ 589.037403][ T21] ? deref_stack_reg+0xd0/0x120 [ 589.042305][ T21] ? 0xffffffffa001a000 [ 589.046522][ T21] ? is_bpf_text_address+0x254/0x270 [ 589.051850][ T21] ? __kernel_text_address+0x9a/0x100 [ 589.057288][ T21] ? unwind_get_return_address+0x49/0x80 [ 589.062952][ T21] ? stack_trace_save+0xf0/0xf0 [ 589.067887][ T21] ? arch_stack_walk+0xf2/0x140 [ 589.072798][ T21] ? stack_trace_save+0xa6/0xf0 [ 589.077713][ T21] ? stack_trace_snprint+0xf0/0xf0 [ 589.082872][ T21] ? __kasan_kmalloc+0xcc/0xf0 [ 589.087700][ T21] ? __kasan_kmalloc+0xb5/0xf0 [ 589.092495][ T21] ? tomoyo_encode+0x27e/0x540 [ 589.097325][ T21] ? tomoyo_path_perm+0x349/0x5d0 [ 589.102382][ T21] ? tomoyo_path_symlink+0xa8/0xf0 [ 589.107570][ T21] ? security_path_symlink+0xdc/0x130 [ 589.112984][ T21] ? do_symlinkat+0x105/0x6b0 [ 589.117750][ T21] ? __x64_sys_symlinkat+0x95/0xa0 [ 589.123020][ T21] ? do_syscall_64+0x4c/0xa0 [ 589.127708][ T21] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 589.133978][ T21] ? rcu_is_watching+0x11/0xa0 [ 589.138792][ T21] ? sysvec_apic_timer_interrupt+0x80/0xc0 [ 589.144671][ T21] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 589.150871][ T21] ? tomoyo_check_acl+0x291/0x3f0 [ 589.156063][ T21] ? tomoyo_check_acl+0x2e0/0x3f0 [ 589.161333][ T21] ? kasan_check_range+0x40/0x290 [ 589.166555][ T21] ? tomoyo_check_acl+0x2e0/0x3f0 [ 589.172153][ T21] ? tomoyo_execute_permission+0x410/0x410 [ 589.178131][ T21] ? tomoyo_path_permission+0x1b4/0x380 [ 589.183776][ T21] ? tomoyo_path_perm+0x3b0/0x5d0 [ 589.189756][ T21] ? tomoyo_path_permission+0x380/0x380 [ 589.195940][ T21] ? __d_add+0x4e0/0x7f0 [ 589.201373][ T21] ? d_set_d_op+0x25b/0x370 [ 589.207514][ T21] ? simple_lookup+0xc1/0xf0 [ 589.213048][ T21] ? lookup_one_qstr_excl+0x11c/0x240 [ 589.218648][ T21] ? tomoyo_path_symlink+0xa8/0xf0 [ 589.225866][ T21] ? tomoyo_path_rmdir+0xf0/0xf0 [ 589.230870][ T21] ? kern_path_create+0x190/0x190 [ 589.236194][ T21] ? security_path_symlink+0xdc/0x130 [ 589.241614][ T21] ? do_symlinkat+0x105/0x6b0 [ 589.246537][ T21] ? vfs_symlink+0x3d0/0x3d0 [ 589.251189][ T21] ? getname_flags+0x1fe/0x500 [ 589.256028][ T21] ? __x64_sys_symlinkat+0x95/0xa0 [ 589.261183][ T21] ? do_syscall_64+0x4c/0xa0 [ 589.265938][ T21] ? clear_bhb_loop+0x30/0x80 [ 589.270850][ T21] ? clear_bhb_loop+0x30/0x80 [ 589.275637][ T21] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 589.281763][ T21] [ 589.423565][ T4258] Bluetooth: hci14: command 0x0409 tx timeout [ 591.513798][ C1] net_ratelimit: 7098 callbacks suppressed [ 591.513819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.532139][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.544465][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.556818][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.569124][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.581495][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.593878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.606211][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.618582][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.630917][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.649424][ T4258] Bluetooth: hci14: command 0x041b tx timeout [ 593.751053][ T4258] Bluetooth: hci14: command 0x040f tx timeout [ 595.847378][ T4258] Bluetooth: hci14: command 0x0419 tx timeout [ 596.533445][ C1] net_ratelimit: 11917 callbacks suppressed [ 596.533466][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.552084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.564476][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.576789][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.589176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.601665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.614395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.626892][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.639436][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.682175][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)